ipl-logo

Why Is Cloud Computing Important

1172 Words5 Pages

B. An Important Emerging Issue in a trend and what it means in context to the industry.
The emerging of cloud computing is one of the most exciting yet challenging things that's happened in the IT world in the last decade for the CIO. Cloud computing is beneficial to CIOs but can also cause disaster. Previously, they made serious decisions on the costly hardware that will be eventually outdate and need to be replaced. This includes installing hardware and software, troubleshooting, maintenance and monitoring. Today, modern CIOs consider renting cloud applications in multiple areas of the business as an alternative, choosing the flexibility, speed and the affordability of the public cloud. The world has changed and everything must move as …show more content…

Cloud computing mitigation strategy.
Cyber threats like denial of service, data breach, and cryptolocker can cause as much damage as physical threats like electrical fires, or burst water pipe floods. These examples of incident and network threats can be as bad as a natural disaster that can occur at any given time. CIOs cannot take anything for granted from the newest topnotch security system or software, secure environment and location. Mitigation strategy is as important as building and maintaining a successful business.
Physical services like a plumber or barber can afford a little more cyber threat than an online service like Amazon and eBay (where every second counts, as there is no physical location). Risk mitigation strategy can be complicated, but it is as important as system implementations, disaster recovery plan to minimize downtime, to protect your assets, and to get back to operation as quick as possible during worse case …show more content…

(2013, December 20). Why enterprise strategies must drive mobility. CIO Insight. p1-1. 1p. 11 Color Photographs. ISSN: 1535-0096. (Accession No: 94951563).
McCafferty, D. (2016, June 22) How More Cloud Services Put the Business at Risk. CIO Insight. Retrieved from http://www.cioinsight.com/security/slideshows/how-more-cloud-services-put-the-business-at-risk.html
McCafferty, D. (2016, September 13). New cloud users put the business at risk. CIO Insight. p1-1. 1p. ISSN: 1535-0096. (Accession No. 118097320).
McKinnon, T. (2012-04-25). The four pillars of a great cloud security strategy. Forbes.com. Retrieved from https://www.forbes.com/sites/ciocentral/2012/04/25/the-four-pillars-of-a-great-cloud-security-strategy/#1fb0e0c81c07 (Accession No: 75122238)
Meyer, C., (2016 April), Bring Your Own Risk in BYOD, Security: Solutions for Enterprise Security Leaders, Vol. 53 Issue 4, p52-58. 3p. ISSN: 0890-8826. (Accession No: 113913552).
Mobile Fact Sheet. (2017, January 12) Retrieved from http://www.pewinternet.org/fact-sheet/mobile/
Versace, M. (2012, October 10). Can Big Data Become a Big Liability? American Banker. Vol. 177 Issue 156, Special Section p24-24, 1p. (Accession

Open Document