Even though cloud computing is regarded as an effective solution for businesses because of the higher flexibility of activities and better manipulation of data, the shift to this practice is associated with a lot of challenges. The role of cloud computing in business is significant as companies can store and use collected and shared data in a new way, minimizing infrastructure expenses and increasing productivity (“Cloud computing for business,” 2016).
Still, many resources are required to successfully transform traditional computing activities in an organization into operations based on cloud computing. It is important to discuss the experience of Kroger in adopting cloud computing and analyze three important security issues associated with the practice.
Kroger, a chain of grocery stores, applied cloud computing systems to enhance its operations and communication between thousands of employees and managers in all its stores. Thus, Kroger started with implementing a Platform-as-a-Service (PaaS) cloud computing solution to organize the launch of new applications and the exchange of data about customers’ orders and the delivery of groceries (Sehgal, Bhatt, & Acken, 2019). The key focus is on improving the delivery of products and customers’ shopping experience using the advantages of cloud computing systems.
However, despite Kroger’s positive experience in launching these systems in their strategy, it is also important to take security issues into account. Cloud computing is associated with such security issues as unauthorized access to data, the loss of data, vulnerabilities in the cloud system. Depending on the application of different programming languages, the Internet connection, and virtual servers to store and share data, cloud computing can result in risks associated with accessing corporate data by external parties through unsecured Internet connections.
If managers do not use hardware to store important data, there are risks of losing all the data from virtual clouds. Furthermore, certain cloud systems have inherent drawbacks related to the cloud environment (Modi, Patel, Borisaniya, Patel, & Rajarajan, 2013). Thus, the ineffective use of applications and browsers can cause certain security issues, when the appropriate usage of hardware for making backup copies can prevent the loss of data.
Cloud computing can be recommended to any company that needs to provide convenient access to the shared amount of data to a great number of corporate users. Little managerial effort is required to use these data, and performance and productivity can increase significantly. However, in addition to recommending the use of cloud computing systems in business operations, it is also necessary to concentrate on guaranteeing the efficient and secure use of data (“Cloud computing for business,” 2016).
All the employees need to receive training regarding the use of data stored and operated with the help of cloud-based solutions. Thus, cloud computing can become part of the corporate IT plan because of the flexibility and convenience of these systems, but much attention should be paid to guaranteeing the security of data access and manipulation.
It is possible to conclude that cloud computing is an effective business solution, and many companies, including IT organizations and businesses from other industries, have recently valued its benefits. Nevertheless, the specifics of applying the systems indicate the necessity of focusing on security. Thus, if security issues are addressed, it is possible to shift to using cloud-based systems. Still, managers need to be prepared for the effective realization of the organizational change as they shift to using cloud computing requires alterations in daily operations.
References
Cloud computing for business. (2016). Web.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of cloud computing. The Journal of Supercomputing, 63(2), 561-592.
Sehgal, N. K., Bhatt, P. C. P., & Acken, J. M. (2019). Cloud computing with security: Concepts and practices (2nd ed.). Cham, Switzerland: Springer.