1. Loss or theft of intellectual property: Companies store sensitive data in the cloud. So cyber criminals try to breach the security of the system.
2. Compliance violations and regulatory actions: Most companies operates some sort of regulatory control of their information . Under these regulations, companies must know where their data is, who is able to access it, and how it is being protected.
3.Loss of control over end user actions: Its important to careful about employees and never give them all freedom that he/she could download all customer contracts because they can access that information once they are employed by competitors .
4. Malware infections that unleash a targeted attack. Cyber criminals used file sharing services to deliver the malware to the cloud server.
কোন মন্তব্য নেই:
একটি মন্তব্য পোস্ট করুন