NEED SOME HELP
CLICK HERE OR CALL US ON
hosting provider in india 1-800-212-2022
web hosting services in USA 1-888-288-3570
Have questions? Let us answer them all!

Go4hosting
FORUM

Go4hosting offers top-notch services, such as dedicated server hosting, VPS hosting, Co- location,Web hosting,
Email hosting, and Cloud Computing solutions. All the services offered by Go4hosting are efficient, reliable,
andcost-effective. , remaining essentially unchanged.

It is currently Mon Nov 11, 2024 12:47 am

All times are UTC + 5:30 hours




Post new topic Reply to topic  [ 2 posts ] 
Author Message
PostPosted: Wed Aug 29, 2018 12:33 pm 
Offline

Joined: Wed Jul 27, 2016 2:53 pm
Posts: 77
What are cloud security challenges?


Top
 Profile  
 
PostPosted: Wed Aug 29, 2018 12:52 pm 
Offline

Joined: Tue Apr 12, 2016 5:42 pm
Posts: 107
With businesses moving their data and operations to the cloud, the providers face many security challenges. One of the biggest challenges is the DDoS attacks or Distributed Denial of Service attacks. This can cripple the cloud servers and they fail to respond to user queries as a result. So, now cloud security services have to be complemented with protection against such attacks.

Another common challenge faced by vendors is data breaches. The incidence of such breaches is on the rise and this leads to a growing challenge to keep data secure. Earlier, traditional IT staff would have a lot of control on the hardware and infrastructure but in the cloud, these controls are handed over to the cloud hosting provider. So, you need a reliable and trustworthy vendor who is capable of overcoming such challenges. Data loss is yet another key cloud security challenge, and whether by deliberate tampering or accidental deletion, data loss can have severe consequences. This is why it is essential to have a proper DR or Disaster Recovery plan in place.

Cloud security is threatened when there are insecure access points. Hackers are on the hunt for such vulnerabilities and you therefore need web application firewalls to scan HTTP requests to see if these are legitimate or not. Finally, it is important to have proper communications for security threats. So, alerting a site or an application manager about a threat as soon as this gets detected is imperative.


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 2 posts ] 

All times are UTC + 5:30 hours


Who is online

Users browsing this forum: No registered users and 3 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to: