You are on page 1of 89

Challenges Infront Of Indian IT Industry

Challenges in Front Of Indian IT Industry

By – Yogesh Kale
Bachelor Of Computer Applications

Supervisor
Dr . Sheetal Chavan
(Professor MIT Cidco Aurangabad)

Marathwada Institute Of Technology , Cidco


Aurangabad
This project has enabled the team to effectively use th e course concepts to
look at Indian IT industry as we researched about industries challenges
The project concepts were extremely useful in framing the relevant
questions for primary
research through Research Papers and various blogs, Conference talks
which helped us to identify the challenges in front of Indian IT Industry

We are thankful to the MIT, Cidco to provide this oppurtinity to research on


various topics and their continous support to give us a great learning
experience

Abstract
This project study explored the various
challenges in the Indian IT industry and
examined how this challenges are affecting on
current IT industry And Also studied various
challenges in-front of Indian IT Industry such as
Cyber Threats, Skill Gap in Indian IT industry ,
Cloud Computing and Work From Home
Culture.
The problem of Cyber Security threats has been
more than 50% increase in data breaches in last
four years. The losses suffered by the industry
because of these data breaches are reported to
be $200,000 on an average across the
businesses in India.
There is a huge gap in the skills the work
demand and the skills job applicants have.
Unemployment is high in our country , but the
fact is that many companies are not able to find
talent to fill the positions.
There are numbers of issues and concerns
associated with cloud-like cost, service provider
reliability, downtime, data overload, password,
security issues and last but most important is
data privacy
Working remotely can present unique
challenges due to the lack of manager or
teammates to consult or to provide immediate
responses or sources.
We also discussed about possible solutions to
those challenges such as . How to avoid
Security Breaches in first place . What can
reduce the current skill gap in Industry . What
are the Current Challenges in front of Cloud
Computing and Also Provided Simple Model for
working from home.
Acknowledgements

I would like to thank MIT for providing me an opportunity to do my bachelors


degree and also the opportunity to take various courses .
I owe my deepest gratitude to my thesis supervisor Dr. Sheetal Chavan for her
guidance, support and patience throughout the duration of this thesis. She is
inspiring, helpful and definitely one of the best professors I have encountered
in my life.

Table Of Contents
1. Introduction
1.1 Problem Background
1.2 Research Purpose

2. Methodology
2.1 Scientific Approach Applied In This Thesis
2.2 Research Process
2.2.1 Area Of Investigation
2.2.2 Review Previous Research
2.2.3 Formulate Hypothesis
2.2.4 Design Study To Test Hypothesis
2.2.5 Conduct Study
2.2.6 Analyze Result
2.2.7 Report Result

2.3 Data Collection

3. Review Of Literature
4. Cyber Threat Challenge
4.1 Cyber Security In 2022
4.2 Model To Mitigate Cyber Threat Risks
4.2.1 Keep Reiterating
4.2.2 Create An Easily Accesible Document
4.2.3 Not Tacke All Vulnerabilities In One Go
4.2.4 Time Frame For Threat Modeling Activity
4.2.5 Use Existing Resources
4.2.6 Which Method To Use Based on Business
4.2.7 Wrapping Up

5. Skill Gap Analysis


5.1 Why Is Skill Gap Present
5.2 Conduct Skill Gap Analysis
5.2.1 Identify Important Skills
5.2.2 Measure Current Skills
5.2.3 Act On Data
5.2.4 Train For Skill Gaps

6. Cloud Computing Challenges


6.1 Security Of Data
6.2 Insufficiency Of Resources and Expertise
6.3 Complete Governance Over IT Services
6.4 Cloud Cost Management
6.5 Dealing With Multi Cloud Environments
6.6 Compliance
6.7 Cloud Mitigation
6.8 Vendor Lock-In
6.9 Unformed Technology
6.10 Cloud Integration
6.11 Conclusion

7. Working From Home Challenges


7.1 Managing Your Own Schedule and Timings
7.1.1 How To Avoid Time Management Doom

7.2 Blurred Line Between Personal & Professional Life


7.2.1 How To Avoid Blurred Work-Life Doom

7.3 Distractions
7.3.1 How To Avoid Distractions

7.4 Reduced Supervision & Direction


7.4.1 How To Avoid Direction Less

7.5 Communication And Co-ordination Challenge


7.5.1 How To Avoid Communication Challenge

8. Summary
9. Conclusion
10. References
1 Introduction
1.1 Problem Background

Growth of Indian IT industry has been


phenomenal , from revenues of 150 million in
1991, it grew into 227 billion dollars in FY22 ,
witnessing a 30 billion dollar incremental
revenue in the year with an overall growth rate
of 15.5 per cent. And the number of employees
increased from few thousand to 5 million with
newly added 450,000 hires in FY22. It also Had
a huge impact on Indian economy.
The IT sector has increased its contribution to
India's GDP from 1.2% in 1998 to almost 10% in
2019. Apart from contributing to the economy
of India and Improving the brand image of India
. The success of IT industry is reflected on the
the growth of other industries as well . There's
been considerable research on the
competitiveness of the Indian industry . Cost
advantage and abundance of human capital are
cited as two of the main advantages india have
compared to other countries . India has used
these strenghts to its advantaged and has build
a strong IT industry.

Recent trends suggest that indian IT industry is


going to face serious challenges such as Cyber
Security Threats , Talent Shortage , Cloud
Computing , Remote Workplace , Risks of
Outsourcing and Government rules of different
countries. Global IT services companies such as
IBM and Accenture , HP , Capegemini has
considerably grown its workforce in India . Even
though the entry of global players has helped
grow the Indian IT industry's share in the global
IT service space , Indian IT companies which is
hedquartered in india or which have faces a
stiff competition because of the rapid
expansion of global players in india.

The problem of Cyber Security threats has been


more than 50% increase in data breaches in last
four years. The losses suffered by the industry
because of these data breaches are reported to
be $200,000 on an average across the business
. Common types of cyber attacks: Phishing ,
DDOS , Spyware, Ransomware, Malware
including viruses like Trojans , Worms , Key
Loggers.

Retention of employees is one of the biggest


challenges for the IT industry. Software
companies recruit people , train them but in
the end , the witness their resignation once
they are enough experienced in the job.
Organization investment into employees to
integrate them into the workflow. There is a
huge gap in the skills the work demand and the
skills job applicants have. Unemployment is
high in our country , but the fact is that many
companies are not able to find talent to fill the
positions.

All organizations in the IT industry are using the


cloud for a wide variety to perform tasks like
data backup, disaster recovery, email, virtual
desktops, software development and testing.
Rather than buying or owning physical data
centres and servers one can access services
such as computing power, storage and
databases from the cloud provider.
However, there are numbers of issues and
concerns associated with cloud-like cost,
service provider reliability, downtime, data
overload, password, security issues and last but
most important is data privacy

Working remotely can present unique


challenges due to the lack of manager or
teammates to consult or to provide immediate
responses or sources. Infrastructure is the
prime need to undertake such tasks, but to
have such an infrastructure large investments
are flown in acquiring assets that can support,
govern and handle the heavy data loads.
However, there are threats to these
arrangements too, hacking and preventing the
theft of data needs powerful firewalls and
software. This is the added cost to the IT
industry.
More companies are opting for outsourcing due
to talent shortage or cost reduction. But
outsourcing has created some challenges like
security threats, legal complications, cultural
and time zone issues.

According to CERT (Computer Emergency


Response Team ) India witnessed 1.16 million
breaches in 2020 .

1.2
Research Purpose
Due to the rapid growth of indian IT industry ,
there is considerable research that has been
done about Indian IT industry. The
Competitiveness of indian IT industry has been
studied both from industry prespective
Madhani(2008) Lee & Park (2010) , Arora et al.,
(2001( and from a firm prespective Mizuho
Corporate bank (2008) . Lee & Park (2010) have
studied the opportunities that aided the
growth of indian IT industry . Considering the
current enviroment , it is becoming important
to study how indian IT companies can compete
In a highly competitive software product
business dominted by global players. The first
section of thesis will concentrate on analyzing
the current oppurtinites created by techno
economic paradigm shifts that will help indian
companies in achieving innovation led growth
by competing against the incumbents with
getting over all technical challenges . The first
research question can thus be formulated as
follows:

1) What are the windows of


oppurtunities created by the technical
challenges that will help the growth of
indian IT industry and will help them to
move up in the value chain towards
technology led innovation?

The seemingly inevitable march of Globalization


has been put in a reverse gear by some recent
political events. First Brexit and then the new
political dispensation in the USA is likely to
result
in a paradigm shift from liberalization and free
trade back to protectionism.
India’s $150 billion Information Technology (IT)
industry, which gets over 60% of its
revenues from the USA could be adversely
impacted if the proposed “High-Skilled Integrity
and
Fairness Act of 2017” is enacted as a law. The
provisions of this act will hit Indian IT
companies
as they are the biggest beneficiaries of the H-1B
visa program. This program allows foreign
professionals to work in the United States, and
India accounts for over 60% of all such visas.
The
looming threat of visa curbs also comes at a
time when the sector is already grappling with
slowdown, with Industry body NASSCOM
revising the growth rate down to single digits in
2016-2017
It can however be argued that such measures
will also affect USA negatively due to cost
escalation and non-availability of local talent
especially in the high skills category jobs.
Anticipating the challenges, the Indian IT
companies have already started to consider a
basket of alternate strategies which range from
acquisitions of American companies and local
campus hiring to enhanced use of automation,
artificial intelligence systems and cloud services
platforms. Adapting to the changed
environment will create unique challenges as
well as
opportunities for the industry to evolve and
execute new business strategies quickly and
successfully. While the immediate fallout may
be negative, diversification and innovation is
the
key to make the industry robust and resilient in
the long run by avoiding over dependence on
any
one single market.

2. What are the bearers and barriers


of ideation in the innovation process
of Indian IT companies?

To overcome the challenges and move towards


progress, innovation ecosystem of the
companies has to be strengthened . Based on
the result of the study here are some of the
challenges that are becoming barriers .

A) Inexperienced Faciliation
B) Unfriendly Space
C) Unclear Goals
D) Egos and Hierarchy
E) Closed Mindedness
F) Limiting Ideas

2) Methodology

The aim of this chapter is to clarify the scientific


approach used in this study and to explain how
this study is conducted. The first part of this
chapter explains scientific approaches applied
in this study and the reasons for choosing
particular approach . Further in the chapter it is
explained how the research methods are used
and the context in which the study is conducted

2.1) Scientific approach applied in this


thesis
The objective of the study is to understand the
current business enviroment of the indian IT
industry and the understand the current state
of factors which can influence the ideation and
innovative capabilites of the industry. This
study does not focus on proving any theory or
in generailizing truth or any cause effect
relationships . It just Concentrates on
identifying and exploring current state.
Understanding them and discussing the
improvements that can be made based on the
study. Empirical data are used to understand
and analyze the current enviroment and some
of interesting factors are further studied to get-
in-depth understanding. Case study
methodology fits the purpose of this study and
it used. The process of study is further
explained in next part of methodology section
2.2 ) Research Process

The research process through which this study


is done is described in the figure 1 . The main
stages of case study methodology are selecting
the Area of Investigation , Review Previous
Research , Formulate Hypotheses , Conduct
Study , Analyze rules and for results evaluate
that Do results support Hypotheses if yes then
Report Results and if No Develop Alternative
Explanation . Since The study follows Straight
forward approach each Method is relied on
previous one .
This approach is adapted from Boehm. V.R
1980 . Research in the "real world" - A
conceptual model.

Area Of investigation
In this phase , changes that are happening in
Indian industry in general and IT industry in
specific are studied to understand the current
business and technical enviroment and to
familiarize with context of the study. The
research is conducted during this phase by
Reviewing previous research papers ,
Conference talks , Social media discussions such
as Linkedin , Twitter .

2.2.2) Review previous Research


In this phase we reviewed all data collected
from previous research and conferences such
as NASSCOM and various blogs and based on
that research we created

2.2.3) Formulate Hypotheses


After Collecting and reviewing all Data from
various resources we gave explanation to the
data in form of hypotheses

2.2.4) Design Study to Test Hypotheses

The Design of study is a rigorous method,


regarded as the most accurate and unequivocal
standard for testing a hypothesis.

2.2.5) Conduct Study

In this phase we conducted a study based on


previously collected data and conduct a
solutions and possible remedies for the
challenges

2.2.6) Analyze Results


After all the study we did an analyzation of the
results and provided some remedies to the
challenges and start to conduct a evaluation in
Study and Results of the hypotheses

2.2.7) Report Results

At this part we started reporting of the results


that based on the study with available research
.

2.3 ) Data Collection

The data is primarily used for two purposes in


this study. First is to understand current
challenges in front of Indian IT industry and to
do a literature review and understand about
the various theoratical frameworks available
and to choose the theoretical framework for
the study

There has been a significant interest in the


Indian IT industry since the last decade because
of its fast growth and because of the significant
amount of jobs it created in Indian . This has
resulted in large amount of literature written
about Indian IT industry . Even though lot of
literatures about Indian IT industry are not
directly upon the topic of study , Data gathered
can be analyzed and used. Web pages and
other data such as job postings and various
research conducted on Indian IT industry are
read to know about their current business and
challenges . Innovative activity of the
companies such as one published by NASSCOM
and NIST were also searched and read.
3. Theory

This Chapter presents the theoretical


framework that is used in the study the
framework described in this chapter will from
the basis of gathering empirical data and to try
to give possible solution to challenges
4. Cyber Threat Challenges

Businesses must take proactive measures to


ramp up cybersecurity ahead of the holiday
season, the most challenging peak period for
cybercrimes, according to a report by McAfee
Enterprise and FireEye.
The report, ‘Cybercrime in a Pandemic World:
The Impact of Covid-19’, states that 77 per cent
of organizations in India experienced downtime
due to cybersecurity risk during the peak
festive season in the last 18 months.
During the same period, 81 per cent of global
organisations experienced increased cyber
threats.
Between September and October 2021, the
study — conducted by market research
specialist MSI-ACI — interviewed 1,451 IT and
line-of-business decision-makers across India,
the US, UK, Australia, France, Germany,
Singapore, South Africa and UAE.
Cybersecurity for ‘new India’
According to IT professionals in India, holidays
have been the most challenging peak periods
for cybercrimes. While 52 per cent of
professionals flagged festive holidays such as
Diwali, Ramadan and Christmas as the peak
period, 32 per cent listed bank holidays, and 12
per cent pointed to summer vacations in
schools and colleges.
During these peak periods, 91 per cent find
maintaining a fully staffed security team even
more challenging under the hybrid work model.
Furthermore, 59 per cent of IT professionals
expect half or more of their colleagues to work
remotely in some capacity.
In terms of cyber risks, the top three were
malware attacks (47 per cent), data breaches
(43 per cent), and ransomware and cloud
jacking (33 per cent each); over 30 per cent of
the IT professionals experienced vulnerabilities
in their ‘Internet of things’ devices.
“It is imperative that all business of scale
evaluate and priorities security technology to
keep them protected, especially during peak
seasons like the holidays,” said Bryan Palma,
CEO of the newly combined company.
“Traditional approaches are no longer enough
— 94 per cent want their organization to
improve its overall cyber readiness — and
businesses need an integrated security
architecture and an always-on approach to
prevent, protect and react to the threats of
today,” added Palma.
With the festive season in India having
commenced with Diwali, 91 per cent of the IT
professionals anticipate a moderate or
substantial impact with an increased demand
for their products and services, the report said.
Most organizations have invested in cloud
security (82 per cent), advanced threat
protection (66 per cent), security operations
center (54 per cent), mobile security (48 per
cent), and endpoint security (48 per cent).
For additional security, 69 per cent of the
organizations are implementing new software
solutions, 68 per cent are strengthening
internal IT-related communications, 62 per cent
are increasing their software updates, and 61
per cent are offering more employee training.
“Cyberattacks tend to skyrocket in India during
the holiday season as we tend to spend more
time online and often let our guard down.
Taking advantage of this, bad actors adopt
newer techniques and sophisticated means to
target businesses when they’re most
vulnerable,” said Venkat Krishnapur, vice-
president of engineering and managing
director, McAfee Enterprise, India.
“The problem is exacerbated with employees
using the same devices for personal and office
work, exposing critical networks and, thus, to
stay ahead of criminals, organizations need to
ramp up their cybersecurity readiness,” added
Krishnapur.

4.1 Cybersecurity in 2022


Malware attacks (54 per cent), data breaches
(50 per cent) and cloud jacking (35 per cent)
will continue to be the top three cyber risks
impacting businesses in 2022.
“However, there are ways for organizations to
be proactive against cybercrime, such as
implementing security measures, providing
cybersecurity awareness training for
employees, and developing prevention and
response plans,” the report said.
The decision-making on cyber security is with IT
directors (58 per cent) and IT managers (56 per
cent).
In terms of investment, the areas in focus
among businesses in India are cloud security
(57 per cent), security operations center (57
per cent), advanced threat protection (55 per
cent) and endpoint security (47 per cent).
As much as 99 per cent of the IT professionals
indicated that their organization could place
more emphasis on its overall cyber readiness;
53 per cent highlighted the importance of
employee training to prevent cybersecurity
issues.

4.2 What We Can Do To Mitigate Cyber


Threat Risks?
Best Practices for Threat Modeling

4.2.1. Keep reiterating


Considering the time and effort threat
modeling requires, it is tempting to do it just
once and never look back. But this is the
biggest mistake you can commit.
Functionalities, assets, roles, and use cases are
bound to change in any application. Always
create a schedule based on time intervals or
milestones in the SDLC process.
4.2.2. Create an easily accessible document
The most important part of threat modeling is
having a clean, exhaustive document in the
end. This document must not be cluttered and
should be formatted well enough to absorb the
changes that come with the iterations. When a
change is made, do not forget to update all
stakeholders. Also, share this document as
broadly as possible. This serves as the base for
any work taken up by your developers,
architects, and product managers.
4.2.3. Integrate the model into your existing
workflow and DevOps process
Wherever possible, integrate the threat
modeling steps into your existing workflow. For
example, if your company uses JIRA and has
opted for the VAST method of threat
assessment, make sure the effort involved in
creating the application threat model is tracked
in JIRA.
4.2.4. Do not try to tackle all vulnerabilities in
one go
Once you have the list of vulnerabilities, do not
rush to implement the countermeasures for all
of them. Calculate the costs of putting security
controls required to mitigate each threat. If the
cost of implementing these controls is more
than the cost of the anticipated threat, you will
not gain anything. Ensure that you maintain a
robust log of vulnerabilities. Do not let the
associated tech debt pile up.
4.2.5. Set a time frame for the threat modeling
activity
The sheer magnitude and scope of this activity
can make it never-ending. This is why it is
important to determine your objectives, time,
and budget scope before you begin.
4.2.6. Use existing resources
While it is tempting to build your own custom
threat library, this is not a good idea. It might
end up with critical vulnerabilities being
missed. There are many libraries available that
you can borrow — CAPEC, OWASP, and WASC-
TC are a few resources. Take advantage of
existing specifications such as the UEFI spec—
leverage existing automation tools such as
Intel’s HBFA.
4.2.7. Decide on which method to use based on
your app and business
There is no one-size-fits-all threat modeling
process. If you have a complex system running
across multiple platforms, STRIDE alone might
not do the trick. If your organization already
thrives on agile, VAST makes sense. Analyze
your requirements carefully and choose the
right method.
4.2.8 Wrapping up
It is evident when you go through these
recommendations that threat modeling can
easily end up becoming a time- and resource-
consuming exercise. This is why you must
follow the above best practices. A robust,
secure application is undoubtedly a source of
comfort and confidence for investors,
stakeholders, and consumers alike.
With the world becoming increasingly digital,
cyber-attacks have become more common and
frequent, and, as such, threat modeling is no
more an optional activity. It is high time that
security efforts catch up with our application’s
designs and development life cycles. Even
legacy systems cannot be exempt from the
process.
5. Skill Gap Analysis

5.1 Why Is Skill-Gap Present


The rise of literacy in India in the past 2
decades has inevitably been plagued by
rising unemployment amongst skilled
personnel. The rise of qualified
personnel has not unfortunately led to
the rise of skilled, employable personnel
in the country.
The rising skilled unemployment in India
is wrongly attributed to shortage of
skilled jobs in the country. With ever
increasing demand from over the world
for Indian talent, the Indian IT services
sector remains perennially hungry for
fresh talented graduates. According to
ManGroup’s report of Talent Shortage
2020, 63% companies in India report
shortage of talent employees, mainly in
IT, engineering services and Sales.
The Indian government and IT firms have
made huge efforts in launching various
programs to bring emerging tech skills in
the country, the state of employability.
However, the state of employability
within the current passing batch of
graduates still remains a question.
The ‘National Employability Report for
Engineers 2019’ put out by a job
assessment platform Aspiring Minds, has
shown that over 80% of engineers in
India are unfit to take up any job in the
knowledge economy.

What we can do to fill the skill gap in IT


industry .

5.2. Conduct Skill Gap Analyses


You can perform a skills gap analysis on
two levels:
• Individual: You can identify the skills
a job requires and compare them to
an employee’s actual skill level.
• Team/company: You can determine
if your employees have the skills to
work on an upcoming project or if
you need to hire externally. This
analysis can help you target your
employee training programs to
develop the skills you need.
Here’s an overview of skills gap analyses,
including scope, examples of when to
conduct a skills gap analysis and ways to
close skills gaps:
HR can initiate team and company-wide
skills gap analyses by holding a meeting
with managers to explain the process. It
can also be a good idea to hire an
external consultant to conduct a skills
gap analysis. Hiring an outside evaluator
can make the process more objective
and will free up staff time to focus on
other relevant work.
5.2.1 Identify important skills
Some employers say they have difficulty
filling jobs because of skill gaps. But
others argue that skill gaps are a product
of unrealistic expectations. Identify the
skills you need by answering two
questions:
• What skills do we value as a
company?
• What skills do our employees need to
do their jobs well now and in the
future?
Consider your company’s job
descriptions, business objectives and
company values. Think of the new skills
your company might need in coming
years. You could also survey team
members on what skills they think are
missing. Their insights could prove
invaluable and involving your employees
can help them feel that they’re
contributing to your company’s growth.
Here’s an example of how to list and
prioritize skills employees, teams and
companies need:
Numerical rating scales can be a more
practical way to assess skills gaps when
you want to aggregate individual scores.
You could use a five-point or three-point
system. Ensure you have explicitly
defined scales. For example, a scale of 1
to 5 could range from poor to excellent,
or inexperienced to expert.
5.2.2 Measure current skills
To measure skill levels, you could use:
• Surveys and assessments.
• Interviews with employees.
• Feedback from performance reviews.
• Skills management software, like
Skills DB Pro and TrackStar that can
make a skills gap analysis much less
time-consuming.
Alternatively, you can measure skills by
creating a skills spreadsheet specific to
each individual position. For example:
Position: Telesales Representative

Sometimes, a skills gap can result from


limited experience, especially in the case
of new hires. Consider on-the-job
coaching as a way to close a skills gap,
instead of formal training. An employee
with the scores listed above probably
doesn’t need training in Customer
Relationship Management (CRM)
software. But, they do have negotiation
and Excel skills gaps. Negotiation skills
are marked as more important than
Excel, so employee training and
development should begin there.

5.2.3 Act on the data


There are two ways to fill skills gaps:
training and hiring. Decide which
approach (or combination) works best
for each skill gap.
5.2.4 Train For Skill Gap
More than half of companies train and
develop their staff to fill open positions.
Offer training for employees in skills
you’d like to strengthen, for example
using SAP or Excel. The right training can
help you close gaps between current and
desired skill levels.
You can use professional training firms
to arrange workshops, training sessions
and seminars for your staff. Along with
formal training, you can also offer:
• Subscriptions, online courses and
educational material.
• Voluntary employee mentorship
programs.
• Opportunities to attend events and
conferences.
• Opportunities to obtain certifications
like Project Management
Professionals (PMP) or Professional
Certified Marketer (PCM).
Hire for skill gaps
If your skills gaps are too wide to
minimize with training, consider hiring to
bring new knowledge and skills into your
company. You could:
• Modify your hiring process to screen
for skills your company needs. For
example, you can add skills
assessments (like writing samples)
and numerical reasoning tests.
• Use structured interviews to reduce
biases and ensure your criteria for
choosing a new hire are strictly job-
related.
• Source passive candidates. Often,
candidates who have the skills you
need aren’t looking for a job. Use
effective sourcing techniques (like
recruiting on Twitter and sourcing
using boolean logic) to find and
contact promising candidates.
Conducting a skills gap analysis can be
time-consuming. But the results are
worth it. Knowing which skills you need
to grow as a business will help you hire –
and retain – the right people.
6. Cloud Computing Challenges

Despite being the major strength of


some businesses, cloud computing also
has some issues. And in some rare
circumstances, this can make some
serious problems as well. These issues or
challenges are real-life ghosts of cloud
computing. Let’s talk about them briefly!
6.1 Security of Data
In terms of security concerns of cloud
technology, we don’t find answers to
some questions. Mysterious threats like
website hacking and virus attack are the
biggest problems of cloud computing
data security.
Before utilizing cloud computing
technology for a business, entrepreneurs
should think about these things. Once
you transfer important data of your
organization to a third party, you should
make sure you have a cloud security and
management system.
Cybersecurity experts are more aware of
cloud security than any other IT
professional. According to Crowd
Research Partners survey, 9 out of 10
cybersecurity experts are concerned
regarding cloud security. Also, they are
worried about the violation of
confidentiality, data privacy, and data
leakage and loss.
Vendor Teradata also conducted a cloud
analytics survey that reveals that 46% of
those reviewed signified more security
with no cloud computing challenge.
6.2. Insufficiency of Resources and
Expertise
The inadequacy of resources and
expertise is one of the cloud migration
challenges this year. As per the report by
RightScale, almost 75% of the
respondent marked it as a challenge
while 23% said that it was a serious
challenge.
Although many IT employees are taking
different initiatives to improve their
expertise in cloud computing future
predictions, employers still find it
challenging to find employees with the
expertise that they require.
According to the Robert Half Technology
2019 Salary Guide, businesses will only
prioritize the tech employees with the
knowledge and skills of the most recent
growth in the cloud, mobile, open-
source, big data, security, and other
technologies in the upcoming years.
Some organizations are also expecting to
win over the challenges of shifting to
cloud computing by employing more
workers with certifications or skills in
cloud computing. Industry professionals
also suggest providing training of
present employees to make them more
productive and speedier using the
trendiest technology.
6.3. Complete Governance over IT
Services
IT always doesn’t have full control over
provisioning, infrastructure delivery, and
operation in this cloud-based world. This
has raised the complicacy of IT to offer
important compliance, governance, data
quality, and risk management.
To eradicate different uncertainties and
difficulties in shifting to the cloud, IT
should embrace the conventional
control and IT management procedures
to incorporate the cloud. Ultimately,
basic IT teams’ role in the cloud has
emerged over the last few years.
Alongside the business unites, core IT
plays an increasing role in the mediation,
preference, and control over cloud
services. Moreover, third-party cloud
computing or management providers
are gradually offering best practices and
government support.
6.4. Cloud Cost Management
The RightScale report revealed that for a
few companies, handling cloud spending
has passed security as the biggest cloud
computing challenge. As per their
anticipations, organizations are ruining
nearly 30% of the money they invest in
the cloud.
Companies make several mistakes that
can increase their expenses. Sometimes,
IT professionals like developers turn on a
cloud instance implied to be utilized for
some time and forget to turn it off again.
And some companies find themselves
hindered by the hidden cloud costing
packages that provide numerous
discounts that they might not be using.
Using cloud spending management
challenges, several tech solutions can
help organizations. For instance,
automation, cloud spending
management solutions, serverless
services, containers, autoscaling
features, and numerous management
tools provided by the cloud vendors may
help lower the possibility of the issue.
Furthermore, some companies have
been succeeded by building a core cloud
team for handling usage and costs.
6.5. Dealing with Multi-Cloud
Environments
These days, maximum companies are
not only working on a single cloud. As
per the RightScale report revelation,
nearly 84% of the companies are
following a multi-cloud strategy and 58%
already have their hybrid cloud tactic
that is combined with the public and
private cloud. Furthermore,
organizations are utilizing five distinct
public and private clouds.

A long-term prediction on the future of


cloud computing technology gives a
more difficulty encountered by the
teams of IT infrastructure. To win over
this challenge, professionals have also
suggested the top practices like re-
thinking procedures, training staff,
tooling, active vendor relationship
management, and doing the study.
6.6. Compliance
Compliance is also one of the challenges
faced by cloud computing in 2022. For
everyone using cloud storage or backup
services, this is a problem. Whenever an
organization transfers data from its
internal storage to the cloud, it
experiences compliance with the laws
and regulations of the industry.
An interesting law aspect of General
Data Protection Regulation (GDPR) is
that it will expedite compliance in the
future. Many organizations require
employing a data protection professional
who can anticipate data security and
privacy according to the needs of the
law.
Considering these professionals are
aware of the compliance needs of the
organizations they are employed,
concentrating on the duties for
compliance will help organizations fulfill
every legal responsibility.
6.7. Cloud Migration
Although releasing a new app in the
cloud is a very simple procedure,
transferring an existing application to a
cloud computing environment is
tougher.
According to the report, 62% said that
their cloud migration projects were
tougher than they anticipated. Alongside
this, 64% of migration projects took
more time than predicted and 55% went
beyond their budgets.
Especially, some organizations migrating
their apps to the cloud reported
downtime during migration (37%), issues
syncing data before cutover (40%), the
problem having migration tools to work
well (40%), slow data migration (44%),
configuring security issues (46%), and
time-consuming troubleshooting (47%).
And to solve over these issues, nearly
42% of the IT experts said they wished
they had increased their budgets,
around 45% wished to have employed
an in-house professional, 50% wanted to
set a longer project duration, 56% of
them wanted they had performed more
pre-migration testing.
6.8. Vendor Lock-In
At present, a few topmost cloud service
providers, for instance, Google Cloud
Platform, Microsoft Azure, Amazon Web
Services, and IBM Cloud, are ruling over
the public cloud market. For IT experts
of the enterprise and analyst, this makes
the vendor lock-in’s specters secure.
In a Hybrid Cloud assessment, nearly
90% of those assessed expressed high to
moderate concern levels regarding this
problem.
As per Gartner’s Cloud Adoption
Statistics 2021, the rising power of the
hyper-scale IaaS providers makes both
the chances and challenges for some
marketing participants and end-users.
Although a few of them allow cost
advantages and efficacy, companies
required to be more alert regarding the
IaaS providers possibly acquiring
unwanted impact over the clients and
the market.
Regarding the multi-cloud acceptance
trends, some companies will highly
demand an easier way to transfer apps,
workloads, and data across the cloud
IaaS providers providing with no penalty.
A few professionals suggested that
before the companies accept a specific
cloud service, they must ponder how
straightforward it will be for transferring
those workloads to another cloud in the
future.
6.9. Unformed Technology
Several cloud computing services are at
the leading edge of technologies such as
advanced big data analytics, virtual
reality, augmented reality, machine
learning, and artificial intelligence.
The possible backlog to availing this
interesting new technology is that
services sometimes fail to fulfill
organizational expectations in terms of
dependability, usability, and
functionality.
However, the only possible fixes for this
issue is changing expectations, waiting
for providers to boost their services, or
trying to create your solution.
6.10. Cloud Integration
Finally, several companies, especially
those with hybrid cloud environments
report issues associated with having
their on-premise apps and tools and
public cloud for working together.
According to survey, 62% of respondents
said integration of legacy systems as
their biggest challenge in multi-cloud.
Likewise, in a Software One report on
cloud cost, 39% of those assessed said
integrating legacy systems was one of
their biggest worries while utilizing the
cloud.
This particular challenge, like the other
ones discussed in this blog, will not
possibly disappear any time in the
future. Combining new cloud-based apps
and legacy systems needs resources,
expertise, and time. But several
companies are considering that the
perks of cloud computing dominate the
backlogs of this technology.
6.11. Conclusion
Cloud computing is an emerging technology. It
is an attractive solution when the infrastructure
or
the IT personnel are not available or too
expensive; but it has its drawback. The
drawback can be
mainly found in the security threats and
vulnerabilities of the cloud computing. Unlike
traditional
solutions where threats come from two known
sources inside or outside the network; cloud
computing security threats might originate
from different sources. In this paper we
discussed
most of the cloud security threats from three
prospective levels: application, network and
user
levels. Also we address some possible ways to
reduce security as possible.

7. Working From Remote Challenges

The COVID-19 pandemic forced many workers


and firms to experiment with working from
home,
showing that many jobs can be done well
remotely. Although long-term outcomes are
unclear, the
amount of work done from home is likely to
remain much higher than it was before the
pandemic.
The increase in working from home is expected
to be an enduring change. Before the
pandemic, about
8% of people regularly worked some time from
home, making up about 2% of total hours
worked. But
even as stay-at-home orders eased in early
2021, the number of people working from
home remained at
just under 40%.
The increase in working from home is a major
change in the labour market that has occurred
at
unprecedented speed.
The ability for people to do their job from home
is strongly tied to the tasks they perform. In
2016,
approximately 35% of workers had jobs that
were amenable to working from home,
including
office-based and ‘knowledge’ workers.
• The potential to work from home is
associated with higher levels of education and
higher incomes, although
there are many lower-paid jobs that require
less education that can be also be done from
home.
Workers and firms are now embarking on a
second wave of experimenting with working
from home,
resulting in a number of different work-from-
home models being tried.
Challenges of Working From Home and How to
Overcome Them
7.1. Managing Your Own Schedule & Time
Sounds appealing, right? No more setting the
alarm for 6am. No more sitting in your cubicle
all day, your only escape a measly hour for
lunch. You can set your own hours and work
when you feel like it. Freedom is yours!
Except it doesn’t work that way.
The concept of “normal business hours”
remains in use all across the globe because it
works as an efficient time management tool.
When you have set hours, you know when
you’re supposed to work and when you’re free
to pursue other interests or spend time with
your family. You can make plans days, weeks,
or months in advance because you know when
you’re going to be working.
Without that structure, many at-home workers
find themselves in big trouble. They sleep in,
they procrastinate, and they tell themselves
they’ll knock it out later on. Suddenly, they look
at the clock and realize their kids come home
from school soon — and they didn’t do what
they’d intended to do.
That leaves them with a choice: work through
the evening or just procrastinate further. Many
conventional employees complain about the
structure of a regular schedule. But it actually
serves them far better than they realize.
7.1.1 How to Avoid Time Management Doom
Set your workdays and hours and stick to them.
In most cases, that either means maintaining
regular business hours or basing your work
hours on the schedule maintained by your
spouse or kids. Not only does a conventional
schedule make you more productive, but it also
allows you to spend time with the people you
care about.
For example, I work from around 7:30am to
12:30pm, then break for 90 minutes or so for a
workout and lunch. I then return to work from
around 2pm to 6pm. On Saturday mornings, I
usually work for two or three hours as well.
But if you do decide to stick with the tried-and-
true 9-to-5, you still reap significant remote
work benefits. You don’t have to commute to
work, so you can sleep in later. Moreover, if
you need to run any important errands like
doctor’s appointments, you don’t have to
request permission.
7.2. Blurred Line Between Personal &
Professional Life
On the other side of the coin, when you work
from home, you no longer have a clear
geographic division between workspace and
personal space.
Ideally, your home is a place of relaxation,
safety, and security. It’s a place where you
subconsciously slip into a calm, easygoing state
of mind, putting the stresses of the workday
behind you.
Working from home punches a hole right
through that neat mental division. Many
telecommuters complain they feel like they’re
never off the job. They always feel a
compulsion to check email or get “just one last
thing done.”
In other words, they have a hard time turning
off and relaxing. Ever.
7.2.1 How to Avoid Blurred Work-Life Doom
You must set aside a physical space for working,
separate from the rest of your home.
For many, that means a home office. My
business partner maintains a home office with
a door that locks and a huge warning sign never
to interrupt her when the door’s closed. It took
a while, but her family eventually learned to
respect the rules. She doesn’t show up at their
work to interrupt them, after all.
I pay for access to a coworking space and find it
worth every penny. It creates a clear division
between my work and personal lives, helping to
maintain work-life balance.
When I do work from home, I set expectations
with my wife not to disturb me unless the
world is ending. I invested in a pair of
outstanding noise-canceling headphones,
which block out family noise and keep me
firmly entrenched in my work.
If you have a spare bedroom, library, den,
formal dining room, or other room in your
home that sees infrequent use, consider
converting it to a home office, even if only
temporarily. If possible, close the doors while
you work and hang a “Do Not Disturb” sign.
7.3. Distractions
Even if you decide on a set schedule and have a
dedicated space to work, actually staying
productive during your working hours can
prove challenging if you’re working from home.
Surrounded by your personal belongings and
reminders of chores, it’s hard to focus.
Distractions like your TV, books, and the
laundry start calling to you. Despite planning to
work until 12:30 before breaking for lunch, you
find an excuse to break early. If your family
members also happen to be home, they don’t
hesitate to interrupt you at every opportunity.
It’s one of the many reasons I avoid working
from my home — to remove those distractions
and keep a firm barrier between my work life
and home life.
7.3.1 How to Avoid Distraction Doom
Physically removing yourself into a separate
home office helps. But also make sure you
remove distractions from your work area. With
no TV or books around, you succumb to them
less easily.
Noise-canceling headphones can help you avoid
auditory distractions, such as your kids playing
or your spouse watching your favorite show.
Set rules with your family not to disturb you
while you’re remote working. Tell them to
behave as though you were at the office.
Then read up on other ways to avoid distraction
when working at home because it makes a far
more significant challenge than most office
workers assume.
7.4. Reduced Supervision & Direction
People love to gripe about their bosses. But
bosses serve a crucial purpose, providing
direction and supervision. They not only tell
you what you need to do, but they give you
feedback about your progress on it.
When you work from home, you tend to get
less supervision and direction. Your boss (or
clients, as the case may be) typically doesn’t
give you as much guidance — guidance many
remote employees desperately need to stay on
track.
7.4.1 How to Avoid Directionless Doom
If you work for an employer, remain in close
communication with your supervisor. Ask them
which projects you should prioritize and when
they expect you to reach each milestone.
At least once each week, connect with them to
discuss your progress, your challenges, and any
ideas to address those challenges. Keep them in
the loop so they can provide better feedback
and direction.
If you work for yourself, start with setting
broad weekly goals. Then every morning, set
three high-priority tasks. You can cycle in
smaller tasks like keeping up with email as you
get a free five minutes, but keep your eye on
the larger high-impact tasks.
All of these help you answer the most critical of
questions: What’s the most important work I
can do today?
7.5. Communication & Coordination Challenges
It’s hard enough to hold productive in-person
meetings to coordinate different team
members’ efforts to remain aligned. When
everyone works from home, it becomes all the
harder to stay on the same page.
Human beings rely on nonverbal
communication when they speak. But emails,
phone calls, and even video calls remove much
of the nuance from how we communicate. Just
think back to the last time someone
misinterpreted an email or text message you
sent for a quick example.
This problem is so inherent in virtual businesses
that an entire industry has sprung up to solve it.
Team collaboration and communication tools
like Slack exist specifically to make it easier for
companies to stay in touch and stay organized.
GoToMeeting is another popular choice for
companies to stay in touch using video
conferencing.
7.5.1 How to Avoid Communication Doom
If you’re a boss or supervisor, schedule weekly
phone or videoconference meetings with your
most important teams. Check each team
member’s progress toward their previously
agreed-upon deliverables and goals. At the end
of each session, set new deliverables and
objectives for each individual. Ask each
responsible team member to repeat these back
to make sure they fully understand them.
Team members should similarly confirm their
priorities and tasks with their boss or
supervisor and colleagues before setting off to
complete them. Virtual communication leaves
too much room for ambiguity, so verify
assignments at the end of any call, conference,
or email. The same policy applies to self-
employed workers communicating with clients
and vendors.
For daily communication, use project
management and collaboration tools like Slack
or nTask to keep track of all communications
and ensure all team members remain in the
loop using the same platform. These allow for
tracked communication threads between two
or more people, assignments, file sharing,
private messages, and more, replacing email for
more consolidated quick communication with
no lost messages, spam, or nonwork
distractions.

You might also like