answersLogoWhite

0

Generally speaking, office cloud computing is very safe. The company that runs the servers will do everything in their power to protect your data. They will put up firewalls that can keep out intruders. They will install antivirus programs that will keep files from being corrupted by viruses. They may even assign a security team to work on the servers so that they can keep up with the advancements that are made by hackers.

User Avatar

Vincent Hilpert

Lvl 13
3y ago

What else can I help you with?

Related Questions

What are the cloud computing risks?

The potential risk of cloud computing is that the cloud may not be available and thus you may not be able to access your documents. Another possible risk is that of security. Many cloud computing strategies offer off line document access as well.


How much security is there in cloud computing?

Private cloud computing systems from IBM and VMware can cost a million dollars. ... computing standards and compliance, SaaS and cloud computing security ... IBM's cloud offering has evolved, helping customers advance their business ..


What are the greatest challenges to cloud computing?

Cloud Security is a problem


What exactly is cloud computing security?

Cloud computing security is a sub-industry of cloud computing that deals with ways to keep information secure in a cloud format. Due to the nature of cloud computing, it is much easier to access information from a remote location, and thus suitable countermeasures must always be introduced.


Is cloud computing is secured?

You can use Spyware Cease to remove virus and protect your PC the above mentioned is about PC security, cloud computing security threats is mainly about: Cloud Security, Data Protection, Identity Management, Physical Security, Application Security, Data Recovery.


Security Risks in Cloud Computing?

The largest security threat to cloud computing is data loss and data breaches. When businesses place massive sets of sensitive data in the cloud, they expose themselves as an easy target for cyber attackers. There are specific Security risks in Cloud Computing that the companies must neutralize before losing everything. The proper access controls, encryption of data, detection of threats, and verification for compliance enhance cloud security.


How secure would cloud computing be for a small business?

Cloud computing is an excellent way to increase the efficiency of a small business. Check with the Cloud Security Alliance (CSA) for their recommendations.


Figuring Out What Cloud Computing Security Risks Are?

Are you trying to find out just what the cloud computing security risks might be? The risks of using cloud computing technology might not be large at all with some networks, but you should still understand what these are before you get involved with any type of these networking businesses.


Where can I go to troubleshoot cloud computing security?

Some good resources for security questions would be cloudsecurity.org and cloudsecurityalliance.org. Both of these websites offer assistance in making sure your cloud computing environment is setup properly in respect to security.


Does cloud computing present a security risk for Canadian businesses?

Any use of computer services involves a risk. But then, computer use of any kind involves risk. There will always be problems with security and privacy at desktop systems. A few areas in Canada have made it an offense for provider such as Cloud to disclose any information gathered through use of their service.


How to find security cloud computing?

The security is included for the cloud computing program that is now available to the public. This program does adapt and format to a Mac as far as I know. This sounds like a question for the customer service reps.


Debunking Cloud Computing Security Issues?

Cloud computing security often comes under fire from critics of the cloud who urge a slower adoption rate of cloud technologies. One of the most serious problems with cloud computing security resides in the offices of cloud hosting providers. Technicians, administrators and support personnel have complete access to all the data owned by the hosting firms' clients. This can result in serious data compromise from which businesses could never recover.