Avoiding Threats in the Cloud