Cloud computing benefits are more than vulnerabilities
Student’s name:
Professor:
Course:
Date:
The use of cloud computing has gained a lot of popularity over the past few years, with many organizations moving their resources to the cloud. Cloud computing comes with several advantages that are attracting several organizations, primarily due to its efficiency and more innovative cost benefits (Gvero, 2014). Today many organizations are moving from company-owned hardware to a service model that is charged peruse, which is a characteristic of cloud computing. Although cloud computing comes with several security issues and vulnerability, in my own opinion, the benefits are more worth than vulnerabilities.
Comparing the benefits and vulnerabilities associated with cloud computing, I believe that the benefits of cloud computing outdo the vulnerabilities. Cloud computing has been identified very important for both small business as well as for medium-sized companies and thus leveling the filled and thus allowing even for smaller firms to be able to get latest and up to date technology which could be very expensive especially for short, medium enterprises (Gvero, 2014). Adaptation of cloud computing makes it possible for businesses to be more flexible as well as save on resources. Another significant benefit that comes with cloud computing is that it allows organizations and individuals to access resources anywhere, anytime, as long as they are connected to the internet. This has enabled organizations to be more productive in that they can access resources over a long time, which was not possible before. Cloud computing also minimizes downtime, and this enables a business to be more productive (Gvero, 2014). Cloud computing vendors can get the best resources as well as individuals who are well trained to deal with security issues; in most cases, getting well-skilled individuals is expensive for many organizations, and thus getting these services from the cloud is the only option.
According to research, most of the data breaches and attacks that are conducted today arise from the mistakes of end-users or employees, and thus individuals have been identified as the weakest link of information systems security. If organizations can take proper measures such as coming up with better policies to manage all the cloud resources, they can be able to bridge or the vulnerabilities of cloud computing, and this will ensure that they can get the best from cloud computing. I believe that cloud computing is here to stay, and thus organizations need to ensure that they can train their workers well as this will reduce the risks of cloud vulnerabilities.
References
Do the risks of cloud computing outweigh benefits? | Risk management monitor. (n.d.). Retrieved from https://www.riskmanagementmonitor.com/do-the-risks-of-cloud-computing-outweigh-benefits/
Gvero, I. (2014). Cloud computing concepts, technology, and architecture by Thomas erl, Zaigham Mahmood and Ricardo Puttini. ACM SIGSOFT Software Engineering Notes, 39(4), 37-38. doi:10.1145/2632434.2632462