2015 Advertising Opportunities - Find Out More!

How Good Do You Feel About Your Cloud Security?

How Good Do You Feel About Your Cloud Security?

When most of us think about our online security, we tend to feel very pleased about ourselves because none of our friends are able to guess our password. And, as far as personal privacy is concerned, we are right to assume that our friends, acquaintances, and the occasional stalker are all that we have to guard against. However, with the great advantages of the cloud comes great responsibility.

The cloud is making available for free a fantastic array of tools and apps that make life more beautiful. But each one of these tools means a new path that hackers can use to access our online data, and if they can break one barrier, it is likely that they can break all.

A couple of months ago, Gizmodo, an IT news site, started to post all kinds of garbage over Twitter. Obviously it wasn’t their own doing, but that of a hacker who was able to hack the iCloud account of one of Gizmodo’s former contributors. From there, the hacker was able to change the Google password of that user, wipe the data on his MacBook Air, iPhone, and iPad, and further hack the contributor’s and Gizmodo’s Twitter accounts.

So there are two questions that you need to ask yourself: How interesting a target are you? And how interesting targets are the people and businesses you are even in the least bit connected with? The answer is crucial not only for your partners but also for yourself because hackers will usually smash your data too just for the fun of it or for making sure that there is nothing leading back to them.

And once you begin to realize that everything, from the smallest iPhone or Android app to a website you contributed to, is a possible gateway to your other, more private online endeavors, you begin to realize how important it is to have secure passwords. And the operative word here is passwords because we already know how to create a strong password, but we rarely create more than two or three for our entire online life. In fact, most people will use one password for their vital accounts, those connected to banks or to online businesses, and the second for their private lives. But the problem is that even the most secure password can be cracked in time and the best thing you can do is to make sure that only one of your online resources will be exposed.

There is also a second lesson in Gizmodo’s tale of security—they were attacked through one of their former contributors. And yet they had not removed the contributor’s access privileges. And that is something we often do: we keep connections to sites and apps that we no longer use and thus we keep open doors to our private lives that translate into even more opportunities for hackers to access them.

So if you want to keep your private affairs private, take the time to create secure passwords for each one of your accounts. And, just as importantly, once you are done with an online connection, make sure to delete all ties to it for both your and their security.

By Luchi Gabriel Manescu

Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

Sorry, comments are closed for this post.

Comics

At CloudTweaks, we're plugged into the cloud, the internet of things and all that the web has to offer. From wearable technology, to mobile computing, cloud computing and big data, CloudTweaks is your source for updates and news on the most innovative technology.

Popular

Top Viral Impact

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All…

Big Data Analytics Adoption

Big Data Analytics Adoption

Big Data Analytics Adoption Big Data is an emerging phenomenon. Nowadays, many organizations have adopted information technology (IT) and information systems (IS) in business to handle huge amounts of data and gain better insights into their business. Many scholars believe that Business Intelligence (BI), solutions with Analytics capabilities, offer benefits to companies to achieve competitive…

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014

BYOD Will Continue To Define Workplaces In 2014 The bring-your-own-device trend has been the subject of scrutiny ever since its initial formation. Given how quickly personal smartphones and tablets became a fixture in everyday life, it makes perfect sense that these mobile machines would slip into workplaces. While BYOD has caused headaches for many businesses,…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

Featured Sponsors

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Blue square_logo_100x100-01
cisco_logo_100x100 vmware citrix100

2015 Advertising Opportunities - Find Out More!

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter