The prospect of having hacked increases when organizations grant 3rd functions use of the APIs. In a worst-situation situation, This may induce the organization to lose private facts associated with their consumers along with other events. A destructive insider, for instance a system administrator, can entry possibly delicate facts. From http://cesareerpm.educationalimpactblog.com/17414448/security-threats-in-cloud-computing-fundamentals-explained