== Risks and vulnerabilities of Cloud Computing ==
While cloud computing is on the cutting edge of information technology there are risks and vulnerabilities to consider before investing fully in it.<ref>Reted Research (2025). ''Securing Cloud Infrastructure in 2025: Trends, Threats, and Best Practices''. https://reted.com/securing-cloud-infrastructure-in-2025-trends-threats-and-best-practices/</ref>. Security controls and services do exist for the cloud but as with any security system they are not guaranteed to succeed. Furthermore, some risks extend beyond asset security and may involve issues in productivity and even privacy as well.<ref>{{cite book |last1=Carroll |first1=Mariana |last2=van der Merwe |first2=Alta |last3=Kotzé |first3=Paula |title=2011 Information Security for South Africa |chapter=Secure cloud computing: Benefits, risks and controls |date=August 2011 |pages=1–9 |doi=10.1109/ISSA.2011.6027519 |isbn=978-1-4577-1481-8 |citeseerx=10.1.1.232.2868 |s2cid=6208118 }}</ref>