The Lighter Side Of The Cloud: Someday
The Lighter Side Of The Cloud – Security Overkill
The Lighter Side Of The Cloud – Missing Manuscript

How Hackers Are Getting Inside Help

How Hackers Are Getting Inside Help

There are more people today aware of the security risks they expose themselves and their companies during their regular internet activities than there have ever been before. The media has made it clear to all internet users just how often and easily their online privacy is threatened and each time some of the best and most common security measures have been detailed. And yet many of the same users that do feel threatened will ignore the most basic security features just to enjoy the fun of online shopping.

According to a survey by ISACA, non-profit IT association, 90% of the people who need to use a PC, laptop or tablet for their work are aware of the dangers that an online persona poses but they and more than half believe that the biggest threat comes from corporations that are desperate to get at their personal, product interest data. With that being the case you would expect that most people would at least try to respect their company’s security settings but that is not the case.

They study looked at how much people enjoy their online line shopping rituals by examining the threats they are willing to face. The most impressive statistic from the report is that 65% of all respondents do not verify the security settings of online shopping sites. That means they are not only endangering their privacy but also their financial security is severely questioned.

Another aspect about online security that the survey looked at was how many people use their work devices for personal online surfing. And while the good news is that we all seem to be doing it 37% of us say that they will spend 2 days during work hours for holiday shopping this year. Of course, dealing with that is at the discretion of the individual managers but the simple fact of spending so much time and sharing so much of your personal data on unsecured shopping networks does bring an increased security risk.

What is even more significant is that there are quite a large percentage of users who endanger more than just their own security but their company’s security as well. There are two basic ways in which this happens: one only poses a risk to the company and to themselves from a privacy point of view and the other one is actually posing a security threat.

From a private data point of view 36% of interviewed people have admitted to accessing social networks sites from their work computers and 19% used their work email address for online shopping. In themselves none of these actions pose very big security threats but they do put out just that little bit more personal information.

However the real security threats come from those 12% of respondents that store work related passwords on their personal computers, thus completely bypassing any security arrangements a company may have made. And there are also another 11% who have used a cloud storage service like Dropbox or Google Drive for their work related documents.

By Luchi Gabriel Manescu

Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

Sorry, comments are closed for this post.

Popular Archives

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About…

Recent

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm? There has been a great deal of discussion surrounding the Internet of Things over the past couple of years as more companies are taking an active and aggressive interest. IBM for example has recently decided to invest $3 Billion over the next 4 years. “Our knowledge of…

Digital Transformation: Miracle and Wonder

Digital Transformation: Miracle and Wonder

Digital Transformation These are the days of miracle and wonder. I’ve been leading a small, global research team at the Tau Institute for the past few years to examine the dynamics of IT adoption in more than 100 countries throughout the world. We’ve developed several indices that show how well these nations are doing on a relative basis. We ranked the nations…

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising