Category Archives: Security

Cloud Services, Security Not Disparate Elements

Cloud Services, Security Not Disparate Elements With many organizations in the United States opting to access cloud services as an alternative to traditional technology infrastructure and equipment, vendors and businesses are continuing to emphasize practices and policies that help companies take advantage of cloud computing without undermining security. According to a recent report by Forbes,…

A Reminder From Yahoo: Change (And Improve) Your Passwords

A Reminder From Yahoo: Change (And Improve) Your Passwords

On January 31, 2014, Yahoo announced that a major theft of mail account passwords had compromised an “ undisclosed number” of accounts. Writing from the Yahoo Tumblr blog, senior vice president in charge of Yahoo’s platforms and personalization products, Jay Rossiter, pointed out the attack was a result of a third-party database being compromised, and not…

iWeb Launches Microsoft Private Cloud Hosting

iWeb Launches Microsoft Private Cloud Hosting

Cloud scalability on dedicated private infrastructure takes business IT to the next level MONTREAL, QUEBEC (January 30, 2014) – iWeb, Canada’s leading cloud service provider, today announced its new Microsoft Private Cloud service, designed to give businesses complete control and flexibility of their IT infrastructure. Businesses can now choose the Microsoft Private Cloud to quickly…

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such…

Cloud Infographic: Personal Data Security

Cloud Infographic: Personal Data Security

Recently, Dashlane released a report that analyzed the password policies of the top 100 e-commerce sites. The results of this report are staggering. They demonstrate that the majority of the top e-commerce sites fail to comply with the recommended password security principles. In their infographic titled “The Illusion of Personal Data Security in E-commerce”, they…

Angry Birds And The NSA

Angry Birds And The NSA

The National Security Agency and British Government Communications Headquarters have been working together since 2007 to plant surveillance into mobile phone users’ applications, allowing them to store location information, alongside a slew of other private information users put into applications.   Popular app Angry Birds was targeted, alongside more common information hotspots like Facebook, LinkedIn…

21st Century Cybercrime – The Evolution Of Protecting Your Data

“21st Century Cybercrime – The Evolution of Protecting Your Data” The relentless development of technology has facilitated an increase in cybercrime, affecting individuals and businesses in different ways and to differing degrees. Since the advent of the internet the protection of data has been of paramount importance, however, the development of various technologies has made the…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor