Security Dangers Online That Need Close Attention

Security Dangers Online

As we’ve seen on this website, cloud computing has an untold number of virtues. From improved portability to increased green credentials of the IT sector and from revolutionising industries to helping the disabled, it is undeniable that the cloud has radically altered our daily lives. Nonetheless, to assume that cloud computing comes without security risks would be both short-sighted and naïve.

Heartbleed, the NSA, WikiLeaks, cybercriminals, and hackers – the list of people who want to exploit your personal information is endless. Sadly complete technological security is difficult to achieve and most users leave their data open to exploitation by making themselves an easy target for the aforementioned groups. Although governments are trying hard to improve the cloud’s security with use of data protection and in-country servers, the reality is that problems will still occur.

Data Centres

We recently looked at reasons why SMEs should do their accounting in the cloud. Although we discovered a number of beneficial reasons, the nature of cloud computing still means that ultimately someone else is looking after your information in an offsite data centre.

That host has a huge amount of control over your information. They are responsible for all updates and have access to your data. Most importantly they are highly unlikely to be as rigorous or precautious with your data as you would be if you used your own onsite data centre. Make sure you choose your host wisely.

Legal Liability

As hackers and cybercriminals become more prevalent we are seeing an increased incidence of data breaches occurring. These breaches can often lead to mass data loss, and in an ever-increasing world of compliance, legal liability, and business continuity that data loss will often result in lawsuits and extended court cases.

Companies are now being directly held to account for inadequate safeguards and lack of privacy protection. While these measures are undeniably expensive to implement, a drawn-out battle through the courts is infinitely more expensive. The recent data breach at Target, which saw up to 70 million customers have personal information and credit card details stolen, could end up costing the company as much as $1.1 billion in lawsuits and compensation claims from the banking industry.

Insider Threats

Although less of a concern for small businesses, the threat of an employee stealing data for either personal gain or corporate humiliation is a very real danger for larger organisations. Some of the most serious recent breaches are a result of an ‘insider job’ – including the Vodafone breach of 2 million customers’ bank details and the now infamous theft of NSA data by Edward Snowden.

In both these examples the data was stolen by a person with access to a privileged user access. Once an employee gains access to a company’s cloud, everything from customer data to confidential information and intellectual property can easily be extracted.

The threat doesn’t end there. Small businesses who do not implement sufficient security could see a former employee with a grudge and a computer potentially delete the entire organisation’s cloud – a move which would have disastrous consequences for a company’s clients and its reputation.

What do you think are the biggest security challenges facing a business which uses the cloud?

By Daniel Price

Internet Security

Firefox introduces Enhanced Tracking Protection for Desktop Users

Firefox introduces Enhanced Tracking Protection for Desktop Users Great news for Mozilla Firefox users as the internet browser rolled out its latest tracking protection features that make web surfing a lot safer. The new Enhanced ...
Mike Johnson

Data Transmission Travel Plans – From The Ground Up

Don’t Forget Networking The term “cloud” was first used by the telecomm industry in early schematics of the Internet to identify the various, non-specific uses data was put to at the end of their cables ...
Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with ...
Gary Bernstein

Infographic: The Data That Never Sleeps

Here’s What Happens Every Minute on the Internet in 2020 In 2020, the world changed fundamentally – and so did the data that makes the world go around. As COVID-19 swept the world, nearly every ...
Move bot migration

MoveBot – New Data Transfer Platform

Data Transfer Platform Branded post by Movebot As cloud computing and storage continue to provide enhanced ROI to organizations, businesses are storing their data on the cloud– instead of on-premise servers. Storage migration is an ...
Jen Klostermann

FinTech and Blockchain vs Traditional Banking

FinTech and Blockchain Growth "The Rise of FinTech - New York’s Opportunity for Tech Leadership", a report by Accenture and the Partnership Fund for New York City, reveals that global investment in FinTech endeavors has ...