Possible Risks

Access Control

How data is access, who can access and where it is physically stored are all crucial to keeping you information safe.
Some cloud hosting does not advice clients as to where there servers are or what measures they have taken to ensure the security of the data.

Govt Intrusion

US & Australian Govt and many other governments are creating laws that allow them access to your information.

Cloud vendors like owning the data because it gives them more legal protection if something goes wrong. Plus, they can search and mine customer data to create additional revenue opportunities for themselves.

Insider Threats

Staff access data from multiple places and having 24 hr access can leave data vulnerable to theft, destruction, sabotage and miss use.

Cyberattacks

Cyberattacks are most problematic on the cloud, where volumes of data are stored by all types of users on the same cloud system.
There are many and varied types of attacks.
Distributed Denial of Service attacks are common. They can make your data unavailable.

Password Theft

Password theft can lead to data theft or sabotage.

Lack of Support

Many Cloud Services can be difficult to contact or in different timezones making it difficult to fix issues quickly and easily. A forgotten password can mean more than a day without access to your data.

Automatic updates enforce change

Without warning key features you rely on can be remove or altered.
The look and feel can change dramatically insisting you relearn your way around.

Costs can change

Some vendors can increase cost without warning or charge by data size leaving the price to vary from the original agreement.

Network Outage or Server downtime

Network outage or server downtime can leave you without access to your data.

Authenication Methods

Cloud service providers should employ a strong authentication method, such as two-factor authentication—which combine two factors to determine who you are (e.g. a token or one time sms), what you have (such as a digital certificate) and what you know (password).

Ensure Safety Standards

Ask what standards are implemented. Read security polices.
Check reviews and reputation.

Password protection

Use strong passwords. Software such as Keepass is designed to encrypt passwords and keeping them safe. They also assist in the fast input of long passwords.
Never give out a password and if you have too, ensure you change it immediately after the need is no longer required.

Backup, Backup, Backup

Don’t trust the cloud. Ensure you have another backup of your data.