• Information is more difficult to monitor and secure.
• They do not allow systematic control over creating, storing, or deleting information.
• Programmatic interfaces of Web 2.0 applications let hackers automate attacks easier.
• Their casual nature may blur the line between business and personal use.
• Lack or loss of connectivity prevents work for those depending on them.
• Data available for forensic examination is lost when data is moved from local storage.