There are! If you think about it, the risks are the same as in a traditional IT environment. What are they storing in your cloud? Does it have any malware embedded in it? If so, how deep is it embedded? How granular are your filtering and antimalware technologies, and how often are they updated? And who is being allowed into your environment? Is the customer responsible for authentication and authorization or are you? If credentials are not kept up to date, unauthorized access could be an issue.
Have a question for Neils Johnson? Send an e-mail to firstname.lastname@example.org.
Dig Deeper on Telecommunication networking
Related Q&A from Neils Johnson
As long as regulators are vague about cloud compliance mandates, providers may fail to win customers in those verticals. But expert Neils Johnson ... Continue Reading
Cloud security is a critical issue for customers, but how useful are cloud security certifications? Security expert Neils Johnson explains how ... Continue Reading
Cloud security expert Neils Johnson discusses the myriad vulnerabilities of cloud computing services and how cloud providers can best protect the ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.