• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cloud Computing • Endpoint Security Cloud  /  Emerging Security Threats in Cloud Computing
Emerging Security Threats in Cloud Computing
22 June 2018

Emerging Security Threats in Cloud Computing

Written by Seqrite
Seqrite
Cloud Computing, Endpoint Security Cloud
17
Shares

The worldwide cloud computing market is expected to grow to $191 billion by 2020. There are numerous advantages of cloud computing driving a move to the cloud; among them lower cost, faster time to market, and increased employee productivity. But what exactly is cloud computing?

What is cloud computing and how it helps?

Cloud computing is a term for the delivery of hosted services over the Internet. It means the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. It relies on sharing of resources to achieve coherence and economies of scale similar to public utility systems. It is undeniable that cloud computing helps companies to minimize upfront IT infrastructure costs and helps to get their applications running faster and more effectively.

However, it would be foolish to imagine that such a highly advantageous application is totally fool-proof and does not bring with it huge security risks and challenges. Most data analysts and security experts have listed six major threats to cloud computing, though others like The Cloud Security Alliance (CSA) have identified nine such threats.

Read more: Security threats in Cloud Computing

Threats to cloud computing

The two major threats which have been identified are the loss and theft of intellectual property. Companies increasingly store sensitive information in the cloud as it is a much cheaper and effective option. However when a cloud service is breached, cyber criminals can gain access to all this sensitive data. According to the CSA report, “If a multitenant cloud service database is not properly designed, a flaw in one client’s application could allow an attacker access not only to that client’s data, but every other client’s data as well.” While a data breach is the result of deliberate and malicious actions, data loss can occur when the encryption code of the stored data is lost.

While data breach and loss are both serious threats, the measures put in place to mitigate one can actually increase the other. While encryption can protect the data, loss of the encryption key leads to complete loss of the data. On the other hand the cloud routinely makes copies of the data as back up. But the more the number of copies the greater is the exposure to data breaches.

Data privacy

Most companies nowadays operate under some sort of regulatory control of their data, for example the HIPAA for private health information or the FERPA for student records. Often this information is stored in the cloud with very limited access and under strict regulations. If this data privacy is violated, it can have serious consequences. Another important threat to cloud computing is when the company does not have any control over the end use of the user of the data. An employee with access to such information can create havoc by malicious use of the data seriously compromising the reputation and trustworthiness of the company concerned.

Read more: Cybersecurity and Compliance requirements: Part 1

Cloud services can also be used for data exfiltration or extrusion. This is the unauthorized transfer of data from a computer or a storage device like the cloud. Cyber criminals can then encode sensitive data and share them on social media. Similarly contracts among business houses restrict how data is used and who is authorized to access it. If an employee moves any such sensitive information to the cloud without proper authorization, it can mean a serious breach of contract or confidential agreement and can lead to legal complications. In turn this can lead to trust deficit of the company concerned. If a breach of trust is suspected, clients may prefer to take their business elsewhere. In a chain reaction this will mean a huge revenue loss for the concerned company.

The latest threat to cloud computing that has been added in 2018 is Spectre and Meltdown. Recent research has revealed that nearly every computer chip manufactured in the last twenty years contain fundamental security flaws. The specific variations on these flaws are dubbed Spectre and Meltdown. This is a huge risk for cloud service providers as the security flaws in the computers can be easily hacked.

Seqrite Endpoint Security Cloud provides a simple and comprehensive platform to manage the security for multiple endpoints remotely from anywhere. Integrating innovative technologies  to provide protection from advanced threats at different levels, Endpoint Security Cloud ensures complete security with easy manageability.

As an IT security partner for your business, Seqrite provides comprehensive security from advanced cyber threats. To know more

 Previous Post5 Poor security practices that endanger an IT organization
Next Post  5 Bad tech habits you need to work on
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • SEQRITE Cloud Security Solution

    Cloud Security Under Siege: Fortify Your Defences Against Emerging Threats

    September 5, 2023
  • Unseen Threats Lurking: Protect Your Small Business from Cyberattacks with the Right Defence Strategy

    April 25, 2023
  • Seqrite EPS Recognized as AV-Test ‘Top Product’ yet again!

    February 10, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies