How Good Do You Feel About Your Cloud Security?

How Good Do You Feel About Your Cloud Security?

When most of us think about our online security, we tend to feel very pleased about ourselves because none of our friends are able to guess our password. And, as far as personal privacy is concerned, we are right to assume that our friends, acquaintances, and the occasional stalker are all that we have to guard against. However, with the great advantages of the cloud comes great responsibility.

The cloud is making available for free a fantastic array of tools and apps that make life more beautiful. But each one of these tools means a new path that hackers can use to access our online data, and if they can break one barrier, it is likely that they can break all.

A couple of months ago, Gizmodo, an IT news site, started to post all kinds of garbage over Twitter. Obviously it wasn’t their own doing, but that of a hacker who was able to hack the iCloud account of one of Gizmodo’s former contributors. From there, the hacker was able to change the Google password of that user, wipe the data on his MacBook Air, iPhone, and iPad, and further hack the contributor’s and Gizmodo’s Twitter accounts.

So there are two questions that you need to ask yourself: How interesting a target are you? And how interesting targets are the people and businesses you are even in the least bit connected with? The answer is crucial not only for your partners but also for yourself because hackers will usually smash your data too just for the fun of it or for making sure that there is nothing leading back to them.

And once you begin to realize that everything, from the smallest iPhone or Android app to a website you contributed to, is a possible gateway to your other, more private online endeavors, you begin to realize how important it is to have secure passwords. And the operative word here is passwords because we already know how to create a strong password, but we rarely create more than two or three for our entire online life. In fact, most people will use one password for their vital accounts, those connected to banks or to online businesses, and the second for their private lives. But the problem is that even the most secure password can be cracked in time and the best thing you can do is to make sure that only one of your online resources will be exposed.

There is also a second lesson in Gizmodo’s tale of security—they were attacked through one of their former contributors. And yet they had not removed the contributor’s access privileges. And that is something we often do: we keep connections to sites and apps that we no longer use and thus we keep open doors to our private lives that translate into even more opportunities for hackers to access them.

So if you want to keep your private affairs private, take the time to create secure passwords for each one of your accounts. And, just as importantly, once you are done with an online connection, make sure to delete all ties to it for both your and their security.

By Luchi Gabriel Manescu

About Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

View All Articles

Sorry, comments are closed for this post.

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…