This website uses cookies to ensure you get the best experience. More info

4 Emerging Cloud Computing Security Risks Infosec Pros Need to Know About

cloud computing security risks

The information technology world is constantly changing and growing. Just about every time you’re at the store there’s a new phone, tablet or gadget on display. By all appearances, the increasingly interconnected world of IT is evolving seamlessly. But as the number and complexity of these devices increases so do the IT security risks.

Many of these risks are now a result of cloud computing, also known more informally as “the cloud.” If you’ve ever sent an email from your mobile device on the go, accessed files through Google Drive or even listened to music with applications like Apple’s iCloud, then you are using cloud computing services. Unfortunately, the new security risks that have resulted from all of this cloud computing have placed us in the middle of an ongoing cyber war, according to Brian Kelley, CIO of Portage, OH.

“There is an ever-increasing need for IT security professionals to leverage their abilities to secure the corporate IT landscape and be ever-vigilant of the inherent computer security risks in the information age,” says Kelley.

So what are these new cloud computing security risks, and what can tech pros do to stay ahead of security breaches? We’ve recruited a number of IT experts to explain the top four cloud computing security risks today’s IT pros are encountering on the front lines.

4 cloud computing security risks

1. Unauthorized data access

With the amount of people accessing or transferring data stored on the cloud, simply preventing unauthorized access can be challenging. “It is critical that user authentication is not only secure but easy to use and simple to manage,” says Steven Sprague, CEO of hardware security company Rivertz Corp.

Cloud services are supported by specific providers, which means that only those providers are aware of any unauthorized access, according to Sprague. Businesses or corporations typically do not have any awareness of how their data is being handled, even if it is stolen. The challenge for IT pros is incorporating built-in security into devices such as smart phones and tablets in addition to applications that use the cloud, so that there is increased data protection for businesses and other users.

“Leveraging the hardware security within the device provides a modern way to ensure that the data is what it claims to be,” Sprague says.

2. Hackers

Even the relatively new world of cloud computing isn’t immune to one of IT’s oldest threats ¬≠– malicious hackers. “Hacking is very profitable, which means companies are constantly under attack. Professional IT security practitioners need to deal with the risk associated with social engineering, out of date systems, insecure software, the cloud, and more,” says Mark Wolters, a research analyst consultant with SecureState.

The cloud is an appealing target in part because so many individual users and corporations are taking it upon themselves to ty and manage their own data. Though most cloud providers have solid security systems in place, they can’t provide the control and security of companies who employ IT professionals to stay ahead of potential vulnerabilities.

“IT is a constantly changing field, and attackers are developing new exploits and methods daily. Security professionals must evolve quickly to keep pace,” says Wolters.

3. Irresponsible file sharing

The feature that makes cloud computing so convenient is also one that makes it a security risk: data stored in the cloud can be accessed from anywhere on the internet, according to Wolters. The good news is that most cloud providers have strong security that can prevent most attacks. The bad news is that sometimes hackers can circumvent these security measures because file sharing to the cloud is often done irresponsibly, says Curtis Peterson, the digital marketing manager for SmartFile, which specializes in secure business file sharing.

The big problem with file sharing is “Shadow IT,” the use of IT tools without having the approval of the organization or an IT professional, according to Peterson. Many employees store confidential company data on their personal file sharing apps, such as Dropbox, without company permission. With sensitive or confidential company information being shared on the cloud through personal accounts, this data becomes less secure.

Peterson says that the future of cloud computing security relies on updating IT infrastructure so that it can control, monitor and automate file activity and prevent irresponsible file sharing.

4. The fast-paced growth of cloud computing

When it comes to the cloud and all the data that is stored and transferred within it, you may be wondering, how exactly can something that big be protected? Though cloud providers offer security oversight for these cloud computing services, another problem is arising. Cloud companies are currently being acquired by larger organizations like IBM or Oracle, according to Bil Harmer, chief security officer at GoodData.

In the past, cloud vendors only had to provide security for one application, says Harmer, but as these larger organizations acquire the cloud vendors, security issues become more complex. “You will no longer have a single, dedicated ‚Äčand tailored security program for a single app; you will instead have a single security program for multiple apps and built on different technology,” says Harmer. This can lead to compromises in cloud computing security.

Not only is the cloud a massive database, but its management is being outsourced to places like China, Ireland, and the Philippines, according to Harmer. The more people handling data means more opportunities for security breaches. “IT security professionals need to look behind the scenes to determine the validity and effectiveness of the cloud providers’ Information Security Management System (ISMS),” advises Harmer.

The cloud floats on

While today’s cloud computing security risks are volatile, one thing is certain: As our relationship with the cloud grows more complex, the problems we face will too. Stay up to date with cloud computing and other trends in the world of IT security by checking out our article: 21 Cyber Security Blogs that Keep IT Pros in the Know.


Aaron Lawrence

Aaron is a freelance writer for Collegis education who writes student-focused articles on behalf of Rasmussen College. His interest in writing articles for students stems from his passion for poetry and fiction and the belief that all words can educate.

default blog author

Related Content

This piece of ad content was created by Rasmussen College to support its educational programs. Rasmussen College may not prepare students for all positions featured within this content. Please visit for a list of programs offered. External links provided on are for reference only. Rasmussen College does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen College is a regionally accredited private college.

chart-credential-laddering-healthcare-management 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE’S DEGREE Start Here MASTER’S DEGREE PURSUERS End Here BACHELOR’S DEGREE End Here MASTER’S DEGREE chart-credential-laddering-rsb 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsd 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 181 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsjs 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-rsn 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 91 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 181 Credits End Here BACHELOR'S DEGREE logo-accreditation-acen logo-accreditation-ccne ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-bank icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-paperwork icon-general-phone icon-general-speak-out icon-head-heart icon-mglass icon-scales icon-camera icon-filter icon-info-circle icon-mail-forward icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-share-square-o icon-spinner icon-tag icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-testimonial-quotes icon-colored-outline-bank icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-padlock-shield icon-colored-advance icon-colored-arrows-cross-curve icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-developement icon-colored-folder-mortarboard icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-head-blocks icon-colored-head-cog icon-colored-laptop-cbe-skyscraper icon-colored-laptop-webpage icon-colored-monitor-paper-scan icon-colored-national icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-skyscraper icon-colored-save-time icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-language-switch icon-util-loading icon-util-open-window-button icon-util-open-window-link icon-util-pdf-button icon-util-pdf-link icon-util-refresh icon-util-x