Privacy In Cloud Computing: Assured Or Assumed?

Privacy In Cloud Computing: Assured Or Assumed?

All avid computer users have enjoyed the benefits and conveniences of cloud computing, either knowingly or unknowingly. Most of us rarely understand what is happening behind the screens, especially when lost in interesting movie or music, or even when perusing the information about your competitors. As a result, the privacy and security of the information in cloud is sometimes assured. What of other times? Is it assumed?

Most of us overlook privacy warning and security procedures when utilizing the ever-dazzling gadgets, most of which expose us to an elevated echelon when it comes to compromises. A certain tech-user had his digital life taken over and destroyed over a span of minutes, with the perpetrators committing vilifying broadcasts in his identity. What started as a simple breach to an email ID boiled down remote erasure of data on multiple gadgets.

In the aftermath, questions lingered regarding the manner in which the perpetrators pulled the stunt off. Was the use of powerful spyware and virus employed to peel back on the secrets of the individuals and reveal overtures into his digital arena? Actually, the gullibility of people and processes was exploited through social engineering.

In just the same manner in which Facebook suggests friends from past associations, social engineering can be used to piece information and data about a single entity from multiple locations. Once the data is collated, it becomes easy to map the weakest link in his digital space, especially if daisy-chaining is used to link multiple accounts on different platforms.

With the rapid changes in the tech-world, it becomes impossible for vendors to keep up with the changes and exposures originating from the improvements in processing speeds. As a result, protection from such instances is accorded through the efforts of the individual, coupled with input from vendors and other service providers.

Loss of data is easily mitigated through back ups in physical locations and utilization of fool-proof sign-in processes to edge out bots. In addition, browsing through certified websites eliminates the exposure to spyware and viruses and other social engineering modules which could exist in different locations. Frequent changes in passwords and log in sequences eliminates exposure as well, since most social engineering stances are presented in predictable mode, which can be disrupted by change in algorithms in the system being tracked.

Finally, efforts by users of gadgets to understand the intricate nature of the gadgets they use are also necessary. Most manufacturers offers guidelines and manuals, most of which are written in extensive fine print, making it hard for people to pay attention to. However, it is imperative to take into consideration basic security measures, just incase.

By Rick Watson

About Watson

Rick has been involved in computer technology for the last 17 years as a consultant to a number of Fortune 500 corporations. He is an avid reader of Sci-Fi books and is a big fan of collecting and restoring old sports cars.

View All Articles

Sorry, comments are closed for this post.

3 Considerations To Help Businesses Navigate Cloud Implementation

3 Considerations To Help Businesses Navigate Cloud Implementation

Cloud Implementation Cloud computing technology has improved significantly in the past year, making it an appealing tool for businesses of all sizes. Cloud computing can benefit businesses in many ways, from cutting costs, to increasing business efficiency, to guaranteeing data recovery in case of an accident. In fact, 47 percent of medium and large enterprises…

OpenStack Interoperability – Dawn Of A New Era?

OpenStack Interoperability – Dawn Of A New Era?

The Interoperability Challenge! OpenStack has always had interoperability as one of its unique selling points. Simply put – you can use OpenStack on-premise and what you develop will also work with other OpenStack environments. Open APIs and open source is the common denominator. However until now, it has been an elusive feature or really dream…

Big Data – Productivity, Innovation And Competitiveness

Big Data – Productivity, Innovation And Competitiveness

Big Data – Productivity, Innovation And Competitiveness Big Data Analytics Big data refers to datasets that are so large, diverse, and fast-changing which need advanced and unique storage, management, analysis, and visualization technologies.  According to McKinsey, Big Data is “the next frontier for innovation, competition and productivity”.  The right use of Big Data can increase productivity,…

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Is Fear Holding Back a Next Generation of Cyber Security Approaches?

Next Generation of Cyber Security As I walked through RSA last week, I was struck by the usual fear laden messages “You’re not safe and never will be but I (vendor) have a silver bullet that will protect you.” And, I wondered if this fear-based approach is deterring a badly needed next generation of cyber…

How Will The Internet of Things Affect The Business World?

How Will The Internet of Things Affect The Business World?

Internet of Things and the Business World? Experts predict that by 2020, the Internet of Things will have a market greater than $1 Trillion, yet despite it being the new buzzword, many people have no idea how this predicted revolution will shape the business world. We’ve all heard predictions of various appliances with sensors, wearable…

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Hybrid IT Matures Just In Time To Tackle Complex Challenges

Tackling Complex IT Challenges Sponsored by Hybrid IT: The Next Evolution in Enterprise IT, NetApp and Verizon. Today’s sophisticated business environment demands a dynamic and robust IT infrastructure which is a far cry from the closed, controlled environments that most IT departments were created to handle. A hybrid IT infrastructure, drawing services from multiple cloud-based…

Featured Sponsored Articles
The Benefits of Cloud-Based Phone Systems

The Benefits of Cloud-Based Phone Systems

Cloud-Based Phone Systems This article has been sponsored by RingCentral, provider of state-of-the-art cloud infrastructure. Although today’s businesses rely on a host of modern technology, the century-old telephone call is as essential as ever. Of course, businesses today aren’t relying on simple analog voice calls for effective interaction with partners, suppliers, colleagues, and customers, but…

Featured Sponsored Articles
Working With Cloud White Label Partners

Working With Cloud White Label Partners

Cloud White Label Services Sponsored by CloudMGR The benefits of consolidating your cloud to one of the giants such as AWS, Microsoft Azure, and Google Cloud are improving as competition increases, with pricing wars between the service providers meaning better savings for businesses utilizing these services, and an abundance of features at user fingertips as…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor