How Good Do You Feel About Your Cloud Security?

How Good Do You Feel About Your Cloud Security?

When most of us think about our online security, we tend to feel very pleased about ourselves because none of our friends are able to guess our password. And, as far as personal privacy is concerned, we are right to assume that our friends, acquaintances, and the occasional stalker are all that we have to guard against. However, with the great advantages of the cloud comes great responsibility.

The cloud is making available for free a fantastic array of tools and apps that make life more beautiful. But each one of these tools means a new path that hackers can use to access our online data, and if they can break one barrier, it is likely that they can break all.

A couple of months ago, Gizmodo, an IT news site, started to post all kinds of garbage over Twitter. Obviously it wasn’t their own doing, but that of a hacker who was able to hack the iCloud account of one of Gizmodo’s former contributors. From there, the hacker was able to change the Google password of that user, wipe the data on his MacBook Air, iPhone, and iPad, and further hack the contributor’s and Gizmodo’s Twitter accounts.

So there are two questions that you need to ask yourself: How interesting a target are you? And how interesting targets are the people and businesses you are even in the least bit connected with? The answer is crucial not only for your partners but also for yourself because hackers will usually smash your data too just for the fun of it or for making sure that there is nothing leading back to them.

And once you begin to realize that everything, from the smallest iPhone or Android app to a website you contributed to, is a possible gateway to your other, more private online endeavors, you begin to realize how important it is to have secure passwords. And the operative word here is passwords because we already know how to create a strong password, but we rarely create more than two or three for our entire online life. In fact, most people will use one password for their vital accounts, those connected to banks or to online businesses, and the second for their private lives. But the problem is that even the most secure password can be cracked in time and the best thing you can do is to make sure that only one of your online resources will be exposed.

There is also a second lesson in Gizmodo’s tale of security—they were attacked through one of their former contributors. And yet they had not removed the contributor’s access privileges. And that is something we often do: we keep connections to sites and apps that we no longer use and thus we keep open doors to our private lives that translate into even more opportunities for hackers to access them.

So if you want to keep your private affairs private, take the time to create secure passwords for each one of your accounts. And, just as importantly, once you are done with an online connection, make sure to delete all ties to it for both your and their security.

By Luchi Gabriel Manescu

Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

CONTRIBUTORS

blockchain

The Global Cloud: Blockchain Could Decentralize SaaS

Blockchain SaaS As the prevalence of SaaS continues to grow, so too does the cloud. You know this because you ...
How to Start Incorporating Machine Learning in Enterprises

How to Start Incorporating Machine Learning in Enterprises

Incorporating Machine Learning in Enterprises The world is long past the Industrial Revolution, and now we are experiencing an era ...
Is Your Data Safe In The Cloud?

Is Your Data Safe In The Cloud?

Cloud Data Safety This year has certainly been troublesome for businesses when it comes to data security. Numerous cyber attacks ...
8 Cloud Characteristics Every ERP System Needs

8 Cloud Characteristics Every ERP System Needs

ERP System Cloud-based ERP systems offer many benefits to a growing organization. And those benefits are catching on in a ...
5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

Customer Service Trends Customer service has become the new battleground in today's marketplace. In fact, 97 percent of customers around ...
Major Cloud Outages

Major Cloud Outages: Five Things Organizations Can Do To Protect Against Network Failures

Recent Major Cloud Outages It is no surprise that whenever there is an outage in a public or private cloud, ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...
Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy ...

NEWS

Tesla Set Unveil a Prototype Electric Big-rig Truck

Tesla Set Unveil a Prototype Electric Big-rig Truck

SAN FRANCISCO (Reuters) - Tesla Inc (TSLA.O) on Thursday will unveil a prototype electric big-rig truck, which may be able ...
OVH Announces New Hosted Private Cloud Offerings for US Market

OVH Announces New Hosted Private Cloud Offerings for US Market

OVH delivers next-generation services for hosted private cloud, disaster recovery, and hybridity leveraging industry-leading solutions RESTON, VA--(Marketwired - Nov 20, ...
One of Sweden's Largest Banks Selects OpenStack Cloud Provider 'City Network'

One of Sweden’s Largest Banks Selects OpenStack Cloud Provider ‘City Network’

SBAB Selects OpenStack Cloud Provider 'City Network' City Network, a leading global supplier of IT infrastructure as a service (IaaS) ...