RT Vol XII: Chap 7: The Cloud and Cybersecurity Threats for the Non-IT Leader
From the Book: The Refractive Thinker® Vol XII: CYBERSECURITY


Summary

Constructed for the leader in a non-IT function, the goal of this chapter is to raise awareness of cyber risks for security, and thus, increase leaders’ value proposition in cloud migration discussions in their organizations. Celaya’s (2015) study identified that organizations lack cybersecurity awareness. Cyber threats are more commonplace than one might think; “of 520 executives surveyed from a variety of industries, 40 percent say data volumes are increasing in size and are becoming unmanageable” (Clemmons, 2008, p. 14). Cloud computing offers flexibility, scalability, reduced costs, and thus, an attractive solution to voluminous data. Hacking data from a computer or a cloud storage device is not difficult; hacking involves understanding a computer’s programing language. Today’s complex software is impossible to produce without flaws and therefore, software vulnerabilities are unavoidable (Zhang, Raghunathan, & Jha, 2014). Data threats continue to increase in various forms of malware that include viruses, keyloggers, worms, botnets, Trojans, and rootkits, which quickly evolve and make defending against hackers a substantial challenge (Zhang et al., 2014). Join us in this chapter for knowledge and empowerment to ask questions regarding cloud services.