Cloud Computing and Security Measures in Business

Introduction

Managing information technology, storage, and servers will have a direct impact on UPMC’s business. Due to a faulty server or the lack of any medical history or records, customer satisfaction and patient care will suffer. In addition, the organization will require different operating systems for servers and computers, as well as distinct Unix and Windows versions and technology management from various vendors. This suggests that UPMC’s administration costs may be high because of the extensive management necessary for its operations. As a result, UPMC must consider capacity planning and scalability, as well as the entire cost of IT assets. Furthermore, it will be forced to invest more and more each year to keep up with the growing demand for storage. Because of the increased demand for servers and storage, they will be compelled to hire technical and professional personnel and ensure that servers are maintained regularly. All of these will add to the company’s expenses.

Therefore, to find a solution to these issues, management must evaluate several aspects and management decisions. For example, to cut expenses and simplify its IT infrastructure, UPMC could choose a single vendor as its principal server and storage technology provider, which would save money. Second, while recruiting technical and experienced personnel, they should guarantee that he or she is an expert in that sector to ensure that their application software and servers are properly maintained. Furthermore, because they are using an online system, management should consider their networking line of authority and keep strict security and privacy. Besides, management must build a clear plan and a positive relationship with vendors to monitor the best quality products and ultimately satisfy their clients. As a result, having a company’s servers might help diversify an organization’s working structure. With its super and mainframe computers, it may also assist in having powerful computing for any work.

Benefits of Cloud Computing

Cloud computing is simply a location where data files may be stored and accessed by anyone, regardless of their location (Srivastava & Khan, 2018). In terms of business, this is a huge help, especially for companies that have employees all over the world. Collaboration inside an organization is simplified thanks to cloud computing. Team members may simply and securely see and share information on a cloud-based platform. Some cloud-based solutions even provide collaborative social areas to connect employees across the organization and increase interest and participation. It is feasible to collaborate without a cloud computing solution, but it will never be as simple or as effective.

Furthermore, few things are harmful to a performance of the company including poor reporting and quality. In a cloud-based system, all papers are stored in one location and in the same format. If everyone has access to the same data, the organization can maintain data consistency, avoid human error, and keep track of any adjustments or updates (Kumar, 2019). All of this ensures that business processes are quality controlled. It also provides a competitive advantage to a company. While cloud computing is becoming more popular, some businesses still want to store their data on their computers. That’s their option, but it puts them at a significant disadvantage when competing with others who have access to the cloud’s benefits. One’s business will be further along the learning curve by the time their competitors catch up if they adopt a cloud-based solution

In addition, cloud computing has aided in the resolution of numerous issues in small and medium-sized businesses. Organizational network upgrades, for example, are capital-intensive, time-consuming, frequently unsettling, and it is challenging to get everyone in the firm to accept new technology. With cloud computing, everything is held in the cloud, so businesses no longer need to upgrade their onsite servers. Their cloud hosting provider handles all backend infrastructure upgrades and even supplies all necessary Microsoft licenses (Srivastava & Khan, 2018). Second, with Covid-19, the need to access the network remotely by employees is increasingly becoming important in today’s enterprises. The cloud enables businesses to do just the business data, programs, and email are embedded in the form of a virtual desktop

Moreover, cloud computing has been able to assist enterprises with cost reduction, which is one of the most pressing challenges in the corporate world. Cloud computing can be a cost-effective option. Because the company doesn’t have to capitalize in a lot of software and hardware, capital expenditures drop dramatically, and IT becomes a monthly operating cost rather than a capital expense (Kumar, 2019). Finally, it aids in the security and catastrophe recovery of businesses. Server failures, desktop failures, power outages, natural calamities, cybercrime, and staff sabotage are among the issues faced in terms of security. Cloud solutions attempt to eliminate these dangers by implementing the most stringent security measures possible, such as redundant power systems, biometric hand scanners, video surveillance, and so on. Furthermore, data backups are included in the system, ensuring that no data is lost in the business.

Marketing firms, data security firms, global corporations, and accounting organizations are among the businesses that are most likely to benefit from cloud computing. Marketers, for example, are a form of an elite sales force that has begun bringing their customers’ products to market through direct events in addition to pushing them through advertising tactics. Daily data may be uploaded and accessible by the home office or other teams via the cloud, regardless of where teams are situated in the field, and even clients can add new information as it becomes available. Cloud computing, on the other hand, benefits data security organizations since it allows them to shift their customers’ files around regularly, making them far more difficult to locate and hack. Furthermore, because a global corporation may have franchises or offices all over the world, each office can use cloud computing to communicate with the others. Working in the cloud can save money for global businesses because it eliminates the need to open physical offices for a large portion of the time. Finally, clients can upload essential financial information to an accounting firm, where an accountant can access it whenever needed. This allows organizations to save a significant amount of time.

North American Casino Security Breach Case

An unauthorized individual gains access to confidential, sensitive, or protected information as a result of a security breach (Johns, 2020). According to this case, the hackers used an Internet-connected fish tank to try to steal data from the casino. The temperature, food, and cleanliness of the fish tank were all controlled by a sensor connected to a PC. Someone got into the fish tank, according to Justin Fier, Darktrace’s director of cyber intelligence, and used it to navigate about the network and send data (Schiffer, 2017). Since the casino’s products were available on the Internet, hackers were able to gain access to data in unusual ways.

This security breach had a detrimental influence on the casino. For example, the corporation lost money since the incidence disrupted work operations due to the outage of the IT system. People are naturally more hesitant to return to a firm where their sensitive financial information has been compromised, even if the breach was not caused by the organization (Johns, 2020). Many hidden costs were also incurred. Legal fees, for example, could be a factor. They also needed to spend more on public relations and investigations, not to mention higher insurance premiums which negatively affected the organization. It also tarnished the casino’s image. This is because some of the company’s emails were leaked, revealing confidential information. Customers respect their privacy as well, and data breaches frequently involve the payment information of the customers. As a result, potential customers will be cautious to trust a company that has a history of poor data protection.

Prevention Tool

To prevent the occurrence of such cases in the future, organizations that use online systems might use firewalls to secure their databases from unauthorized penetration. It is a piece of hardware or software that stops undesirable malware from infiltrating a person’s computer (Johns, 2020). A pin number, password, and login name can all be assigned by the casino. These one-of-a-kind pieces of information assist prevent scammers from signing in under a phony name or engaging in other unethical behavior that jeopardizes the site’s credibility.

Second, casinos can utilize data encryption technologies, which provide an extra layer of security in the online casino banking process and are used by the most reputable businesses. It can employ the Secure Socket Layer Data Encryption Code (SSL), which encrypts all data sent to and from casinos and converts it into a code that is indecipherable to third parties. Only those who are formally designated to receive patrons’ financial information in the first place can crack the code. Finally, online casinos must educate and train their employees. This is performed through educating people about the need of reporting data breaches or leaks. Creating a policy that outlines how employees should handle, dispose of, retrieve, and send data is also a good idea.

Ethical Issue

Cybersecurity practices are primarily concerned with upholding ethical standards through safeguarding the integrity, functionality, and dependability of human institutions/practices that rely on online data, systems, and networks. Some ethical considerations have been abused in this case. For example, there has been a breach of privacy. The casino’s data was stolen, exposing emails containing confidential information about the company and its clients. As a result, the company’s trade secrets were also compromised. This is the one-of-a-kind, top-secret feature of an idea that only the organization knows about. It was also discovered that fraudulent actions were taking place, which is immoral. Theft of valuable data, including files that entailed financial information, credit information, and organizational fundraising, occurred. The organization suffered a significant loss as a result of this. As a result, it is recommended that businesses adopt cloud computing and other security measures to ensure that their ethical obligations are constantly met.

References

Johns, E. (2020). Cyber security breaches survey 2020. London: Department for Digital, Culture, Media & Sport.

Kumar, G. (2019). A review on data protection of cloud computing security, benefits, risks, and suggestions. PDF). United International Journal for Research & Technology, 1(2), 26.

Schiffer, A. (2017). Web.

Srivastava, P., & Khan, R. (2018). A review paper on cloud computing. International Journal of Advanced Research in Computer Science and Software Engineering, 8(6), 17-20.

Cite this paper

Select style

Reference

Premium Papers. (2023, January 6). Cloud Computing and Security Measures in Business. https://premium-papers.com/cloud-computing-and-security-measures-in-business/

Work Cited

"Cloud Computing and Security Measures in Business." Premium Papers, 6 Jan. 2023, premium-papers.com/cloud-computing-and-security-measures-in-business/.

References

Premium Papers. (2023) 'Cloud Computing and Security Measures in Business'. 6 January.

References

Premium Papers. 2023. "Cloud Computing and Security Measures in Business." January 6, 2023. https://premium-papers.com/cloud-computing-and-security-measures-in-business/.

1. Premium Papers. "Cloud Computing and Security Measures in Business." January 6, 2023. https://premium-papers.com/cloud-computing-and-security-measures-in-business/.


Bibliography


Premium Papers. "Cloud Computing and Security Measures in Business." January 6, 2023. https://premium-papers.com/cloud-computing-and-security-measures-in-business/.