SHARE
Facebook X Pinterest WhatsApp

Cloud, BYOD Are Not Without Risks

Two of the most common rallying cries when it comes to reducing cost and increasing efficiency would probably be the use of cloud and BYOD. In fact, I have recently recommended that SMBs leverage the cloud in order to trim their IT budgets. However, implementing cloud services and BYOD is not without its own set […]

Written By
thumbnail
Paul Mah
Paul Mah
Feb 15, 2013

Two of the most common rallying cries when it comes to reducing cost and increasing efficiency would probably be the use of cloud and BYOD. In fact, I have recently recommended that SMBs leverage the cloud in order to trim their IT budgets.

However, implementing cloud services and BYOD is not without its own set of risks, too, as highlighted by recent incidents.

BYOD adds complexity

The first incident involves iOS 6.1 that was released on Jan. 28. It came with a significant bug that resulted in excessive generation of log entries on Exchange Servers. According to Microsoft, the bug resulted in “rapid growth in transaction logs, CPU use, and memory consumption in Exchange Server 2010 when a user syncs a mailbox by using an iOS 6.1-based device.”

In a nutshell, the problem is a serious one, especially for organizations with large iOS deployments given its inadvertent denial-of-service-like behavior on Exchange Server. The bug has since been acknowledged by Apple, though it appears that some IT administrators are forced to specifically block Apple devices. Due to my prior management of Exchange Servers, I can add that this is not the first time an iOS bug has resulted in problems with Exchange.

The takeaway here: BYOD is increasing the number of things that can go wrong at unexpected places.

Cloud vulnerabilities

By virtual aggregation and specialization, cloud service providers are able to offer the advantage of lower prices and more robust services. However, it does not mean that they are infallible. Indeed, some may argue that cloud vendors actually present a larger and hence more appealing target for hackers.

Another less obvious downside may be the use of obsolete or security-ridden infrastructure. Administrators and IT managers are typically left unaware of any known or new vulnerabilities in the underlying cloud fabric, but which are nevertheless passed on to their applications. This was precisely what happened to me when my personal website at thetechblogger.com was hacked earlier this week and replaced with a static page announcing the fact.

Though I initially believed that the hack was due to my neglect in updating the underlying WordPress CMS, my checks quickly made it evident that it was the shared server that was hacked. The attack vector meant that there was essentially nothing I could have done to prevent it from happening – a problem faced by businesses investing into the cloud.

Conclusion

There is no doubt in my mind that implemented correctly, cloud services and BYOD can offer tremendous benefits and value to small and mid-sized businesses. However, SMBs must also recognize that every technological implementation will come with its own set of weaknesses.

Where cloud services and BYOD are concerned, the former could entail hidden security vulnerabilities, while the widespread adoption on the latter may result in more things that could go wrong at unexpected junctures.

Recommended for you...

Is 5G Enough to Boost the Metaverse?
Litton Power
Apr 18, 2022
Building a Private 5G Network for Your Business 
Kihara Kimachia
Apr 18, 2022
Best Enterprise 5G Network Providers 2022
5G Cybersecurity Risks and How to Address Them
Kihara Kimachia
Dec 17, 2021
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.