Should you choose Cloud Computing for Enterprise Systems?
- Data Breaching
- Data Loss
- Account or Service Traffic Hijacking
- Insecure APIs
- Denial of Service
- Malicious Insiders
- Abuse of Cloud Services
- Insufficient Due Diligence
- Shared Technology
Many of them relate in one way or another to the weaknesses implicit in Shadow IT. Several are intrinsic to ALL information technology systems. These are further complicated by different data governance laws in different countries.