Keeping It Safe In The Cloud

Is It Safe In The Cloud?

It would be wonderful to think we live in a safe, secure, world but unfortunately we don’t. In the world of computing, this is even more true. Our digital lives are important to us and take years to build, but only a matter of hours to destroy, if that.

Security is important to everyone. Especially when you have spent years of your life trying to get a film to the big screen and you don’t want anyone to steal it or tamper with it. Add on something which seems as esoteric as the cloud and cause for concern happens. But should it?

Whether you like it or not, the film industry is becoming even more reliant on cloud computing. This has brought numerous benefits, increased productivity and just made a very hard industry a lot easier. The benefits have not stopped worrying stories hitting the media lately about security breaches.

Mat Honan from Wired Magazine had the data on his MacBook, iPhone and iPad deleted after a group of hackers hacked into his Apple iCloud account. The hacker’s took advantage of the fact that the Apple iCloud does not have a two-factor authentication system, something that Apple might want to fix. The hackers accessed his account remotely and Honan lost childhood pictures of his daughter amongst other things. He investigated and wrote an amazing article on it which you can read here.

Honan even chatted to one of the hackers involved. Honan has lost things you cannot even put a price on. His amazing investigation also tells you how Gmail, Amazon, iCloud, and Twitter give determined hackers enough information to ruin your life.

And who can forget the Playstation Network (PSN) going down?

But, as Honan said: “In many ways, this was all my fault. My accounts were daisy-chained together.” There are precautions you can take to keep your accounts safe.

How to stay safe

  • Multiple backups. Including an offsite one.
  • Research your cloud computing service. Make sure they take your security seriously. There are a lot of cloud services available so you have plenty of choice.
  • Don’t have one password for every account.
  • Don’t be over-trusting with your personal details. Make sure security is in place before you hand anything over.
  • Go for a cloud computing service which has a two-prong security service.
  • Choose proper, secure, passwords.
  • Keep your software up to date.
  • Have an antivirus, even if you have a Mac.

Safe clouding.

By Catherine Balavage

Sorry, comments are closed for this post.

Is Your Corporate Data Appearing On Personal Clouds?

Is Your Corporate Data Appearing On Personal Clouds?

Corporate Data Appearing On Personal Clouds Enterprise cloud adoption has led to cloud consumerization, but how safe is any personal cloud? Remember when you’d join a company and they’d issue a desktop computer and corporate-issued cell phone? And remember all the company’s data was stored in a server on-site at the company? It’s fair to…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor