Newsletter Subscribe

Bringing you thought leadership, news, infographics, resources and our own brand of comics each week to your inbox...

Keeping It Safe In The Cloud

Is It Safe In The Cloud?

It would be wonderful to think we live in a safe, secure, world but unfortunately we don’t. In the world of computing, this is even more true. Our digital lives are important to us and take years to build, but only a matter of hours to destroy, if that.

Security is important to everyone. Especially when you have spent years of your life trying to get a film to the big screen and you don’t want anyone to steal it or tamper with it. Add on something which seems as esoteric as the cloud and cause for concern happens. But should it?

Whether you like it or not, the film industry is becoming even more reliant on cloud computing. This has brought numerous benefits, increased productivity and just made a very hard industry a lot easier. The benefits have not stopped worrying stories hitting the media lately about security breaches.

Mat Honan from Wired Magazine had the data on his MacBook, iPhone and iPad deleted after a group of hackers hacked into his Apple iCloud account. The hacker’s took advantage of the fact that the Apple iCloud does not have a two-factor authentication system, something that Apple might want to fix. The hackers accessed his account remotely and Honan lost childhood pictures of his daughter amongst other things. He investigated and wrote an amazing article on it which you can read here.

Honan even chatted to one of the hackers involved. Honan has lost things you cannot even put a price on. His amazing investigation also tells you how Gmail, Amazon, iCloud, and Twitter give determined hackers enough information to ruin your life.

And who can forget the Playstation Network (PSN) going down?

But, as Honan said: “In many ways, this was all my fault. My accounts were daisy-chained together.” There are precautions you can take to keep your accounts safe.

How to stay safe

  • Multiple backups. Including an offsite one.
  • Research your cloud computing service. Make sure they take your security seriously. There are a lot of cloud services available so you have plenty of choice.
  • Don’t have one password for every account.
  • Don’t be over-trusting with your personal details. Make sure security is in place before you hand anything over.
  • Go for a cloud computing service which has a two-prong security service.
  • Choose proper, secure, passwords.
  • Keep your software up to date.
  • Have an antivirus, even if you have a Mac.

Safe clouding.

By Catherine Balavage

Philips spotlights connected technology, predictive analytics software, and artificial intelligence advancing population health and precision medicine at HIMSS 2017 AMSTERDAM, Feb. 17, 2017 /PRNewswire/ -- Featuring new and enhanced connected health offerings at the 2017 HIMSS Conference & Exhibition (HIMSS17), Royal Philips (NYSE: PHG,AEX: PHIA), a global leader in health technology, will showcase a broad range of population health management, ...
Read More
Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer community — will be held at the McEnery Convention Center in San Jose. The conference, kicking off June 5, will inspire developers from all walks of life to turn their passions into the next great innovations and apps that customers ...
Read More
When Cisco Systems Inc. reports earnings Wednesday, the big question will be if the networking giant’s repeated gambles on software can reverse a yearlong sales slide, or at least point to a reversal of that trend in the future. Cisco CSCO, +1.06%  is scheduled to report fiscal second-quarter earnings less than a month after announcing its latest multibillion-dollar software acquisition, ...
Read More
Offering Integrated and Automated Solutions, Expansive Partner Ecosystem, Advanced Architecture with Cross-Industry Collaboration SAN FRANCISCO, Feb. 14, 2017 – Today Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation through updated integrated solutions, new cross-industry partnerships and product integrations within the Intel Security Innovation Alliance and Cyber Threat Alliance (CTA). “Transforming isolated technologies ...
Read More
IoT Enablement, Analytics Offer Strong Monetisation Opportunities HAMPSHIRE, UNITED KINGDOM--(Marketwired - February 13, 2017) - A new study from Juniper Research has calculated that mobile network operators can realise an additional $85 billion in revenues over the next five years through the deployment and enhancement of non-core services including Big Data analytics and IoT (Internet of Things) enablement. Operators "Can ...
Read More