Sometimes we can all have our heads in the clouds, but is it really where we want our data?
For a skilled hacker, a cloud based system is a treasure trove of sensitive data, all just a few clicks away. When a breach occurs, the impact isn’t just limited to legal issues. Imagine the loss of confidence of your supporters and brand damage, the impact will be felt for years. System vulnerabilities, or exploitable bugs in programs are nothing new, but they have become an increasing problem with the advent of multi tenancy. When in cloud computing you upload data to