Cloud computing
Cloud computing TREND 1
Part 1
Bandwidth continues to be the issue here in South Africa. This has caused slow adoption of cloud services amongst the South African businesses (5). Compared to other countries, South Africa has been behind in the adoption of cloud computing, this is because of lacking infrastructure and limited bandwidth which makes it expensive (5). The availability of service providers is also an issue, many companies consider moving to the cloud as a risk because of the above mentioned reasons.
Part 1
Bandwidth continues to be the issue here in South Africa. This has caused slow adoption of cloud services amongst the South African businesses (5). Compared to other countries, South Africa has been behind in the adoption of cloud computing, this is because of lacking infrastructure and limited bandwidth which makes it expensive (5). The availability of service providers is also an issue, many companies consider moving to the cloud as a risk because of the above mentioned reasons.
Part 2
The dark side of cloud computing is firstly security (1), here in south Africa, most companies still do not trust cloud services even if many other things such as facebook, Google and linked in are provided via a cloud (4). According to the survey conducted by Deliotte on the 100 JSE companies, Loss of control of the data by the business is another issue; the company has to trust the third party service providers with their data (11). Many businesses are sceptical about putting their applications on the cloud, so they start with less important applications or the applications that have less to do with the core service or product of the company (7). Companies move less risky applications to the cloud, they are still hesitant to trust the cloud completely and rum applications that drive their business. This helps when a cyber attack takes place; the companies’ crucial information will still be safe as the application will be running on the internal network.
Also here in South Africa, the lack of code of conducts and standards make cloud computing very risky for businesses. Compared to other countries, especially developed countries where standards for cloud computing do exist.
Mondaq.com provides one of the ways that South African businesses can protect themselves and try and mitigate the risks provided by cloud computing (10). One of the suggestions is the verifying of service providers.
The dark side of cloud computing is firstly security (1), here in south Africa, most companies still do not trust cloud services even if many other things such as facebook, Google and linked in are provided via a cloud (4). According to the survey conducted by Deliotte on the 100 JSE companies, Loss of control of the data by the business is another issue; the company has to trust the third party service providers with their data (11). Many businesses are sceptical about putting their applications on the cloud, so they start with less important applications or the applications that have less to do with the core service or product of the company (7). Companies move less risky applications to the cloud, they are still hesitant to trust the cloud completely and rum applications that drive their business. This helps when a cyber attack takes place; the companies’ crucial information will still be safe as the application will be running on the internal network.
Also here in South Africa, the lack of code of conducts and standards make cloud computing very risky for businesses. Compared to other countries, especially developed countries where standards for cloud computing do exist.
Mondaq.com provides one of the ways that South African businesses can protect themselves and try and mitigate the risks provided by cloud computing (10). One of the suggestions is the verifying of service providers.
Social media
Social networks Trend 2
Part 1
According to bozcommunity.com, South Africa has its own unique approach towards the adoption of social media as compared to the rest of the world, especially developed countries (13). Many big agencies are building brands online and promoting their businesses online. With the rise in Smartphones, this has a huge impact on the use of social media
Part 1
According to bozcommunity.com, South Africa has its own unique approach towards the adoption of social media as compared to the rest of the world, especially developed countries (13). Many big agencies are building brands online and promoting their businesses online. With the rise in Smartphones, this has a huge impact on the use of social media
Part 2
Social networks have a dark side that can be categorised in two broad attacks, firstly Malware, spyware and phishing, hackers try to hack into social networks and still people’s information. This applies to both south Africa and the rest of the world. The second one it the impersonation of profiles, this comes in two forms, one is the inappropriate advertising. South Africa has been slow in seeing the verification of accounts of on social media, compared to developed countries where verified accounts of both celebrities and brand Identity are present (12). Another concern regarding fake accounts is paedophiles. In the news we have had a lot of stories reported of a woman being raped by someone she met on facebook or some other social network like mxit.
In south Africa, social media being a threat to the work place, many companies here in south Africa see facebook as a threat to the productivity of their employees, other have taken measures to block facebook on their company networks, that is during working hours (8).
Social networks have a dark side that can be categorised in two broad attacks, firstly Malware, spyware and phishing, hackers try to hack into social networks and still people’s information. This applies to both south Africa and the rest of the world. The second one it the impersonation of profiles, this comes in two forms, one is the inappropriate advertising. South Africa has been slow in seeing the verification of accounts of on social media, compared to developed countries where verified accounts of both celebrities and brand Identity are present (12). Another concern regarding fake accounts is paedophiles. In the news we have had a lot of stories reported of a woman being raped by someone she met on facebook or some other social network like mxit.
In south Africa, social media being a threat to the work place, many companies here in south Africa see facebook as a threat to the productivity of their employees, other have taken measures to block facebook on their company networks, that is during working hours (8).
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Trend 3
Part 1
Many companies are allowing their employees to bring their own devices at work; this makes it easier for employees since they work with devices that they are more comfortable with (2), (3). In South Africa, this is still new; most companies still deploy devices for their employees.
Part 2
Bring your own device
Bring your own device trend has brought a lot of chaos for the company network administrators. It requires more flexibility and creativity from the IT stuff of the company (Thomson, 2012). In terms of costs, outside vendors have had to come in and assist companies to try and integrate these devices to the company network; this has cost the company money in order to ensure smooth integration. BYOD has raised many security questions, as much as companies support the BYOD; at the back of their minds they are worried about the security of company data, for example, data leaks, malware and hacking (Mansfield-Devine, 2012). This is because these devices that employees bring to work have not been configured and locked down to being secure by the company IT department. Many employees use these devices e.g. iphones for personal use at home, this might put the company information at risk.
References
1.Angelo Comazzetto, & Sophos. (2012). Botnets – The Dark Side of Cloud Computing Retrieved 18 august 2012, 2012, from http://www.infosecurity-magazine.com/view/24987/comment-botnets-the-dark-side-of-cloud-computing/
2. Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer Fraud & Security, 2012(4), 14-17. doi: 10.1016/s1361-3723(12)70031-3
3. Thomson, G. (2012). BYOD: enabling the chaos. Network Security, 2012(2), 5-8. doi: 10.1016/s1353-4858(12)70013-2
4. Deloittereview.com Deloitte Review: Cloud Hits the enterprise http://deloitteblog.co.za.www102.cpt1.host-h.net/wp-content/uploads/2012/08/Cloud-hits-the-enterprise.pdf
5. http://www.deloitte.com/view/en_ZA/za/insights/press-releases/0603e80244fc8210VgnVCM100000ba42f00aRCRD.htm Cloud computing in a South African business context 6. http://usa.kaspersky.com/about-us/press-center/in-the-news/facebook-fakes-dark-side-social-networking 7. http://www.worldwideworx.com/smes-slow-to-harness-cloud/
8. http://ramonthomas.com/downloads/Facebook_the_Facts.pdf Facebook the Facts
A Guide for Reducing Technology Stress and Increasing Workplace
Productivity, Ramon Thomas
9.http://www.mondaq.com/x/137474/Privacy/SA+Business+Warned+To+Mitigate+Cloud+Computing+Risks
10. http://www.worldwideworx.com/corporate-sa-looks-to-cloud/
11. IP EXPO Corporate Cloud Survey 2011 http://www.worldwideworx.com/wp-content/uploads/2011/12/2011-11-15-IPEXPO-Cloud-Survey.pdf
12. [2012 trends] 12 specifically South African social media trends By: Amanda Sevasti Whitehouse http://www.bizcommunity.com/Article/196/424/69162.html
Part 1
Many companies are allowing their employees to bring their own devices at work; this makes it easier for employees since they work with devices that they are more comfortable with (2), (3). In South Africa, this is still new; most companies still deploy devices for their employees.
Part 2
Bring your own device
Bring your own device trend has brought a lot of chaos for the company network administrators. It requires more flexibility and creativity from the IT stuff of the company (Thomson, 2012). In terms of costs, outside vendors have had to come in and assist companies to try and integrate these devices to the company network; this has cost the company money in order to ensure smooth integration. BYOD has raised many security questions, as much as companies support the BYOD; at the back of their minds they are worried about the security of company data, for example, data leaks, malware and hacking (Mansfield-Devine, 2012). This is because these devices that employees bring to work have not been configured and locked down to being secure by the company IT department. Many employees use these devices e.g. iphones for personal use at home, this might put the company information at risk.
References
1.Angelo Comazzetto, & Sophos. (2012). Botnets – The Dark Side of Cloud Computing Retrieved 18 august 2012, 2012, from http://www.infosecurity-magazine.com/view/24987/comment-botnets-the-dark-side-of-cloud-computing/
2. Mansfield-Devine, S. (2012). Interview: BYOD and the enterprise network. Computer Fraud & Security, 2012(4), 14-17. doi: 10.1016/s1361-3723(12)70031-3
3. Thomson, G. (2012). BYOD: enabling the chaos. Network Security, 2012(2), 5-8. doi: 10.1016/s1353-4858(12)70013-2
4. Deloittereview.com Deloitte Review: Cloud Hits the enterprise http://deloitteblog.co.za.www102.cpt1.host-h.net/wp-content/uploads/2012/08/Cloud-hits-the-enterprise.pdf
5. http://www.deloitte.com/view/en_ZA/za/insights/press-releases/0603e80244fc8210VgnVCM100000ba42f00aRCRD.htm Cloud computing in a South African business context 6. http://usa.kaspersky.com/about-us/press-center/in-the-news/facebook-fakes-dark-side-social-networking 7. http://www.worldwideworx.com/smes-slow-to-harness-cloud/
8. http://ramonthomas.com/downloads/Facebook_the_Facts.pdf Facebook the Facts
A Guide for Reducing Technology Stress and Increasing Workplace
Productivity, Ramon Thomas
9.http://www.mondaq.com/x/137474/Privacy/SA+Business+Warned+To+Mitigate+Cloud+Computing+Risks
10. http://www.worldwideworx.com/corporate-sa-looks-to-cloud/
11. IP EXPO Corporate Cloud Survey 2011 http://www.worldwideworx.com/wp-content/uploads/2011/12/2011-11-15-IPEXPO-Cloud-Survey.pdf
12. [2012 trends] 12 specifically South African social media trends By: Amanda Sevasti Whitehouse http://www.bizcommunity.com/Article/196/424/69162.html