Keeping It Safe In The Cloud

Is It Safe In The Cloud?

It would be wonderful to think we live in a safe, secure, world but unfortunately we don’t. In the world of computing, this is even more true. Our digital lives are important to us and take years to build, but only a matter of hours to destroy, if that.

Security is important to everyone. Especially when you have spent years of your life trying to get a film to the big screen and you don’t want anyone to steal it or tamper with it. Add on something which seems as esoteric as the cloud and cause for concern happens. But should it?

Whether you like it or not, the film industry is becoming even more reliant on cloud computing. This has brought numerous benefits, increased productivity and just made a very hard industry a lot easier. The benefits have not stopped worrying stories hitting the media lately about security breaches.

Mat Honan from Wired Magazine had the data on his MacBook, iPhone and iPad deleted after a group of hackers hacked into his Apple iCloud account. The hacker’s took advantage of the fact that the Apple iCloud does not have a two-factor authentication system, something that Apple might want to fix. The hackers accessed his account remotely and Honan lost childhood pictures of his daughter amongst other things. He investigated and wrote an amazing article on it which you can read here.

Honan even chatted to one of the hackers involved. Honan has lost things you cannot even put a price on. His amazing investigation also tells you how Gmail, Amazon, iCloud, and Twitter give determined hackers enough information to ruin your life.

And who can forget the Playstation Network (PSN) going down?

But, as Honan said: “In many ways, this was all my fault. My accounts were daisy-chained together.” There are precautions you can take to keep your accounts safe.

How to stay safe

  • Multiple backups. Including an offsite one.
  • Research your cloud computing service. Make sure they take your security seriously. There are a lot of cloud services available so you have plenty of choice.
  • Don’t have one password for every account.
  • Don’t be over-trusting with your personal details. Make sure security is in place before you hand anything over.
  • Go for a cloud computing service which has a two-prong security service.
  • Choose proper, secure, passwords.
  • Keep your software up to date.
  • Have an antivirus, even if you have a Mac.

Safe clouding.

By Catherine Balavage

Sorry, comments are closed for this post.

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…