4 Emerging Cloud Computing Security Risks Infosec Pros Need to Know About

cloud computing security risks

The information technology world is constantly changing and growing. Just about every time you’re at the store there’s a new phone, tablet or gadget on display. By all appearances, the increasingly interconnected world of IT is evolving seamlessly. But as the number and complexity of these devices increases so do the IT security risks.

Many of these risks are now a result of cloud computing, also known more informally as “the cloud.” If you’ve ever sent an email from your mobile device on the go, accessed files through Google Drive or even listened to music with applications like Apple’s iCloud, then you are using cloud computing services. Unfortunately, the new security risks that have resulted from all of this cloud computing have placed us in the middle of an ongoing cyber war, according to Brian Kelley, CIO of Portage, OH.

“There is an ever-increasing need for IT security professionals to leverage their abilities to secure the corporate IT landscape and be ever-vigilant of the inherent computer security risks in the information age,” says Kelley.

So what are these new cloud computing security risks, and what can tech pros do to stay ahead of security breaches? We’ve recruited a number of IT experts to explain the top four cloud computing security risks today’s IT pros are encountering on the front lines.

4 cloud computing security risks

1. Unauthorized data access

With the amount of people accessing or transferring data stored on the cloud, simply preventing unauthorized access can be challenging. “It is critical that user authentication is not only secure but easy to use and simple to manage,” says Steven Sprague, CEO of hardware security company Rivertz Corp.

Cloud services are supported by specific providers, which means that only those providers are aware of any unauthorized access, according to Sprague. Businesses or corporations typically do not have any awareness of how their data is being handled, even if it is stolen. The challenge for IT pros is incorporating built-in security into devices such as smart phones and tablets in addition to applications that use the cloud, so that there is increased data protection for businesses and other users.

“Leveraging the hardware security within the device provides a modern way to ensure that the data is what it claims to be,” Sprague says.

2. Hackers

Even the relatively new world of cloud computing isn’t immune to one of IT’s oldest threats ­– malicious hackers. “Hacking is very profitable, which means companies are constantly under attack. Professional IT security practitioners need to deal with the risk associated with social engineering, out of date systems, insecure software, the cloud, and more,” says Mark Wolters, a research analyst consultant with SecureState.

The cloud is an appealing target in part because so many individual users and corporations are taking it upon themselves to ty and manage their own data. Though most cloud providers have solid security systems in place, they can’t provide the control and security of companies who employ IT professionals to stay ahead of potential vulnerabilities.

“IT is a constantly changing field, and attackers are developing new exploits and methods daily. Security professionals must evolve quickly to keep pace,” says Wolters.

3. Irresponsible file sharing

The feature that makes cloud computing so convenient is also one that makes it a security risk: data stored in the cloud can be accessed from anywhere on the internet, according to Wolters. The good news is that most cloud providers have strong security that can prevent most attacks. The bad news is that sometimes hackers can circumvent these security measures because file sharing to the cloud is often done irresponsibly, says Curtis Peterson, the digital marketing manager for SmartFile, which specializes in secure business file sharing.

The big problem with file sharing is “Shadow IT,” the use of IT tools without having the approval of the organization or an IT professional, according to Peterson. Many employees store confidential company data on their personal file sharing apps, such as Dropbox, without company permission. With sensitive or confidential company information being shared on the cloud through personal accounts, this data becomes less secure.

Peterson says that the future of cloud computing security relies on updating IT infrastructure so that it can control, monitor and automate file activity and prevent irresponsible file sharing.

4. The fast-paced growth of cloud computing

When it comes to the cloud and all the data that is stored and transferred within it, you may be wondering, how exactly can something that big be protected? Though cloud providers offer security oversight for these cloud computing services, another problem is arising. Cloud companies are currently being acquired by larger organizations like IBM or Oracle, according to Bil Harmer, chief security officer at GoodData.

In the past, cloud vendors only had to provide security for one application, says Harmer, but as these larger organizations acquire the cloud vendors, security issues become more complex. “You will no longer have a single, dedicated ​and tailored security program for a single app; you will instead have a single security program for multiple apps and built on different technology,” says Harmer. This can lead to compromises in cloud computing security.

Not only is the cloud a massive database, but its management is being outsourced to places like China, Ireland, and the Philippines, according to Harmer. The more people handling data means more opportunities for security breaches. “IT security professionals need to look behind the scenes to determine the validity and effectiveness of the cloud providers’ Information Security Management System (ISMS),” advises Harmer.

The cloud floats on

While today’s cloud computing security risks are volatile, one thing is certain: As our relationship with the cloud grows more complex, the problems we face will too. Stay up to date with cloud computing and other trends in the world of IT security by checking out our article: 21 Cyber Security Blogs that Keep IT Pros in the Know.


Aaron Lawrence

Aaron is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen College. His interest in writing articles for students stems from his passion for poetry and fiction and the belief that all words can educate.

default blog author

Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college.

Add your comment


Please enter your name.


Please enter your email.


Please enter your comment.


Take the Next Step—Talk to Us!

There are some errors in the form. Please correct the errors and submit again.

Request More Information

Talk with a program manager today.

Fill out the form to receive information about:
  • Program Details and Applying for Classes 
  • Financial Aid and FAFSA (for those who qualify)
  • Customized Support Services
  • Detailed Program Plan

Step 1 of 3

What's Your Name?

Please enter your first name.

Please enter your last name.

Step 2 of 3

Contact Information

Please enter your email address.

Please enter your phone number.

Please enter your five digit zip code.

Step 3 of 3

Program Preferences

Please choose a school of study.

Please choose a program.

Please choose a degree.

The program you have selected is not available in your area. Please select another program of interest.

By requesting information, I authorize Rasmussen College to contact me by email, phone or text message at the number provided. There is no obligation to enroll.

icon-colored-advance icon-colored-build icon-colored-certificate icon-colored-continual-developement icon-colored-growth icon-colored-national icon-colored-prep icon-colored-regional icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-laptop icon-general-leader icon-general-map icon-general-paperwork icon-general-phone icon-general-speak-out icon-camera icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-share-square-o icon-spinner icon-tag logo-accreditation-acen logo-accreditation-ccne ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x