The Lighter Side Of The Cloud – Propositions
The Lighter Side Of The Cloud – Resistant
The Lighter Side Of The Cloud – The Name Game
The Lighter Side Of The Cloud – Synchronization
The Lighter Side Of The Cloud – Microsoft Updates

Has The Public Gotten Use To Privacy Violations?

Has The Public Gotten Use To Privacy Violations?

We keep talking about how we want to keep our privacy in this new world of information sharing and consumption but that is getting increasingly hard to do. The governments of the free world understand the value of information monitoring and know the merits of not trusting anyone, not even its own people. They know that to protect its sovereignty and its people, it must be willing to violate some trusts. That is why for the past few years any news that relates to breaches or the possibility of one becomes one of the most hotly debated topics on the web. But because this has happened so many times and with the results being so anti-climactic, very few people to actually matter have felt the extreme effects of it, the buzz around the issue is down to a simmer rather than a violent boil. People have slowly become accustomed to putting information in public places and have heard so many news stories about privacy issues, and since they have not felt its repercussions, they have subconsciously dumbed down the threat of such violations.

The public is a fickle creature which can be easily controlled by the mass media. People easily believe what they see and read in news stories being fed to them by the government as long as it comes from “credible” source or there is an “expert” being associated with it. The problem is that some of these news and articles are in some way or another meant to make the public complacent with the growing problems being faced in today’s cyber world which to the dismay of many security experts is still being fanned by the emergence of Cloud Computing services and technologies.  Because of Cloud storage and data syncing, it has become very easy for people to get a hold of other’s data just by the information they can find publicly about a person through social networking sites like Facebook, Google+ and Twitter. Because as you know, the most basic security questions to retrieve account names and passwords that are being used are simple things like the birthdate, mother’s maiden name, pets, or schools that a person has gone to, all of which are even shared publicly by most people. It’s also easier to track people. For example, the Facebook check-in function may allow another to know a person’s exact location if the check-in has been made public or if the person is a “friend” or has been “followed.” Newer technologies also solidify the apparent privacy concerns we are facing now.

Cloud Computing only serves to provide cyber criminals with a wider market field and a richer source for information. Sure, a lot of measures are being taken to hamper the above threats, but what man has made another man can undo eventually. Our safety now lies in the hands of security experts who are in a constant back and forth dance with cyber criminals.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

Sorry, comments are closed for this post.

Recent

Cloud Vendor Benchmark 2015: Price-Performance Comparison

Cloud Vendor Benchmark 2015: Price-Performance Comparison

Cloud Vendor Benchmark 2015: 15 Top IaaS Providers  Cloud Spectator has released their Cloud Vendor Benchmark 2015 Part 2: Price-Performance Comparison Among 15 Top IaaS Providers today, cited as the industry’s most comprehensive study. Exposing the influence that performance can have on the overall value of the IaaS environment, this report is aimed at helping…

Finland and The Future of The Internet

Finland and The Future of The Internet

Finlands Internet Future In so many ways, the nations of Northern Europe seem to be a few steps ahead of the rest of the world – countries like Norway, Sweden, Denmark, and Finland are frequently singled out for praise in areas as diverse as education, technology, and sheer happiness (despite the grey skies and bitter…

Technologies That Work Nicely With The Cloud

Technologies That Work Nicely With The Cloud

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a look at some of the more exciting emerging technologies that can be used in conjunction…

Popular Archives

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising