The 'rogue cloud' or the threat of uncontrolled availability

Sell Database Forum connects professionals to advance database strategies
Post Reply
asimd5
Posts: 30
Joined: Thu Dec 05, 2024 9:13 am

The 'rogue cloud' or the threat of uncontrolled availability

Post by asimd5 »

Free access to information, its accessibility and ease of use, from any place and at any time, and through different devices, is a desirable situation for any user. For whom is it not? we might ask ourselves in this technological field based on immediacy and the incessant search for maximum efficiency.

Now, what happens when that particular user who wants to share his favorite music playlists with his colleagues through an application in a Public Cloud is also an employee of an organization that decides to use the same space to share information from the company he works for, without having an appropriate level of security and without list of belgium consumer email the approval and authorization of his company? The gap that opens at the level of information security is significant, not only because of the high risk involved in using spaces that are unmanaged, uncontrolled and unintegrated into the corporate structure itself, but also because they are outside the scope of the organization's competence. This situation, also known as 'rogue cloud', often escapes the knowledge of the area in charge of security, so the exposure to the risk that it entails can be sustained indefinitely.


Information is one of the most important assets of any company today, but its ease of use can be counterproductive if proper security management is not taken into account, which guarantees its protection and adequate security measures to which every user must be sensitive. This is where the concept of 'rogue cloud', or cloud without authorization, becomes more relevant.

Image

You may also be interested in: GDPR in the field of marketing
According to a recent Symantec study, a high percentage of companies had problems last year with the use of unauthorized cloud applications by their employees. Spaces that, as I have mentioned, are shared in the cloud, and are not directly controlled by the organization, since third parties may be accessing their information, with the added risk of possible identity theft.

Ultimately, they are information systems that are not integrated into the company's infrastructure and therefore, the use made of them and the data shared therein lack the proper control and authorization.
Post Reply