The Lighter Side Of The Cloud – Thin Client
The Lighter Side Of The Cloud – Data Storms
The Lighter Side Of The Cloud – Holiday Photos

What Effect Will the Epsilon Data Theft have on Cloud Computing?

What Effect Will the Epsilon Data Theft have on Cloud Computing?

There’s no denying that security remains the prime concern that’s causing people to think twice before migrating to the cloud. While the benefits of cloud computing far outweigh the potential problems, even security, the fact remains that unless such concerns are eliminated, adoption of cloud computing will continue to be hampered (See: Is Cloud Computing Secure? Yes another Perspective).

In this light, the recent data breach at consumer marketing firm Epsilon will definitely hold back the march of cloud computing across enterprises. If you are a customer of any one or more of the following companies or institutions – Best Buy, Ethan Allen, Marriott, Walgreens, Target, JPMorgan Chase, TiVo, Capital One Financial, Marks & Spencer, Lacoste, Kroger, Disney and AbeBooks – you may already be aware of the problem in hand courtesy apologetic mails sent by the aforementioned companies.

If you are not, here’s the background to the matter under discussion. Epsilon is a marketing firm that manages email communications for a host of companies, sending out 40 billion e-mails every year. On 1 April it released a statement that it had detected an “unauthorized entry” into its system on 30 March that exposed customer names and e-mail addresses. The company said “no other personal identifiable information associated with those names was at risk.” On 4 April, Epsilon said that the breach affected “approximately 2 percent of total clients.”

Epsilon’s initial announcement was quickly followed by mails from the affected companies trying to reassure customers about their commitment to data security and privacy, while at the same time warning them about possible spam and phishing mails. However, one of the main questions troubling cloud computing enthusiasts is how this will affect the nascent technology.

For better or worse, Epsilon is recognized as a company that uses cloud computing. Hence, a security breach at Epsilon is akin to a blow on the reputation of cloud computing. While it may not be a critical blow, it’s a hard one nevertheless. Even if people are unaware of the cloud computing angle, the trend of outsourcing capabilities (as with cloud computing) may itself come under threat. So cloud computing gets hurt, one way or the other.

While it’s wrong to use isolated incidents as excuse to disparage cloud computing, a topic I had discussed earlier (See: Gmail Outage – Is Cloud Computing To Blame?), CTOs and customers will become wary of this new technology. As an analyst put it, “the multi-tenant environment of cloud services means that a breach into one system can give hackers a multitude of data. The Epsilon breach reignites concerns about the security of this environment.”

What aggravates this problem is the wide range of companies affected. While many of them may have been contemplating moving to the cloud in the near future or even taken the first few steps in that direction, this incident will give them pause. While emails themselves may not be as sensitive as financial information, the damage to reputation will still be quite severe – both for the companies and Epsilon.

For the cloud computing industry, the best way to counter this is to use it as a learning experience and come up with industry best practices to address security concerns. The Epsilon breach may not end up ending cloud computing, but it has certainly shaken it up good and proper.

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

3 Responses to What Effect Will the Epsilon Data Theft have on Cloud Computing?

  1. Excellent article. Also, Google to “The Business-Technology Weave.” That author has a great post about the Epsilon breach too, as well as lots of great security articles. He’s the author of “I.T. Wars: Managing the Business-Technology Weave in the New Millennium.” We use the book at work – my copy is dogeared and highlighted to death! Check out the blog for sure – great stuff.

  2. As always I can only advocate to use encryption as a layer of separation. As other recent data thefts (e.g. WordPress, EMC, Microsoft BPOS) are showing, cloud vendors should really invest into higher security – it´s for the benefit of all cloud service providers.

  3. We’ve used the Epsilon breach as an opportunity to confirm with our customers the methods in place to protect their environments. With Epsilon, it isn’t known (at least that we’ve seen) that the breach was from an external Internet based hack. As you know, the most effective breaches are from inside organizations and it’s a great time to review everyone’s external as well as internal controls.

    We continue to see dramatic growth in moving customers to a completely hosted solution. With exposures so high for smaller companies, moving their environments to secure SAS70 data centers with all the controls in place, are huge upgrades that they’d never be able to afford by themselves.

    Thanks,
    Bill Sorenson
    CEO IVDesk
    http://www.IVDesk.com

Recent

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market  We’ve talked a fair bit about e-Learning and MOOCs (Massive Open Online Courses) technologies here on CloudTweaks over the past number of years. The industry is expected to continue to grow at a brisk pace as more and more firms and educational institutions start to adopt cloud based services.  Docebo has an excellent…

Big Data, Business Intelligence And The Programming Language “R”

Big Data, Business Intelligence And The Programming Language “R”

Why Your Next Business Intelligence Hire Will Use R As anyone working in the field knows, business intelligence is an evolving landscape. New technologies, combined with a rapidly expanding marketplace, are disrupting legacy solutions and established platforms. Despite such growth, however, there have been a few constants, such as the R programming language. As other…

Beyond Gaming: Three Practical Applications For Oculus Rift

Beyond Gaming: Three Practical Applications For Oculus Rift

Three Practical Applications For Oculus Rift  Since the announcement of the Oculus Rift in 2012 gamers and game developers alike have been frenzied trying to both get their hands on the unit or build their own proprietary VR machine. The VR gold rush has since lead to the announcement of Project Morpheus from Sony and…

Popular

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. So much, in fact, that you’re probably getting sick of hearing about it. Here are some interesting facts you might not know about big data via The Visual Capitalist: Big Data got its start in the…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Sponsored Posts

How CYOD Helps Make Hybrid Cloud More Productive And More Secure

How CYOD Helps Make Hybrid Cloud More Productive And More Secure

How CYOD Helps Make Hybrid Cloud More Productive and More Secure Recent analysis by IDG/DELL has found that companies are expecting “increased IT efficiencies” and “lowering total cost of ownership (TCO) with optimized application delivery” as they move toward hybrid cloud and private cloud deployment. In short, they expect things to work better and cost…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising