The process of moving data, other business elements, or applications into a cloud computing environment is cloud migration.

There are different types of cloud migration that can be done by a corporation. A typical method is transition of information, and software to the public cloud from a regional ITIL 4 certification.


Without proper planning, a transition can adversely affect the performance of workload, and lead to increases higher IT costs, thereby negating some of cloud transfer’s major benefits:

  • Targeted attacks by Malware Infections

Cloud services can be used as an exfiltration tool for information. Techniques have been discovered for data exfiltration by converting sensitive data into video files through hackers and uploading it to sites like YouTube.

There is a Malware that exfiltrates sensitive data from private Twitter accounts at the rate of 140 characters at a time. Cyber criminals use file-sharing services to distribute the Malware to the targets using phishing attacks. Thus, posing a risk.

  • Breaches of Contracts

Agreements between business parties often limit the use of data, and who is allowed to access it. If workers transfer restricted information to the cloud without consent, business contracts may be broken, and legal action can be taken.

Take the example of a cloud service which, in its terms and conditions, reserves a right to share all data transmitted to the system with third parties, thereby violating a business partner’s confidentiality agreement.

  • Increased Customer Turnover

If the customers even sense that their data isn’t completely protected by security checks, they may transfer their business to another corporation that they can trust. A growing number of critics are warning consumers not to preserve client privacy by means of cloud companies.

  • No Tracking of End User Actions

If businesses are kept in the dark, cloud-based staff can do almost anything, and nobody would know — until it’s too late to do anything.

For example, if a sales representative is about to resign from a certain company, he can download a compilation report of all client contacts, interactions, and upload the data to a personal cloud storage. And can use that information after being employed by a competitor of his or her previous employer.

This example is one of the most common threats to ITIL 4 courses

  • Intellectual property misuse or theft

Businesses and corporations increasingly upload sensitive data to the cloud storage. An analysis (source: Skyhigh) examined the fact that 21% of cloud file sharing uploads contain sensitive data, including intellectual property. Cyber criminals may gain access to this sensitive information when a cloud service is compromised. Even if there’s no breach, certain services could even risk claiming the ownership of the content you’re uploading under their terms and conditions.


Although cloud-based apps may be the latest trend in businesses, it doesn’t mean that you should automatically follow them merely because others do so. Cloud computing has many benefits, but it’s consequences are too dangerous to ignore.