The top cloud computing threats and vulnerabilities in an enterprise environment

Picture credit: iStockPhoto

Analysis I’ve seen different companies with operational models 90% based on cloud services, where the rest of the 10% is constituted of in-house servers. The basic response after asking about security issues related to cloud services was that the cloud service provider will take care of them and they don’t have to worry about it.

This isn’t necessarily the case with every cloud service provider, since some CSPs have a good security model in place, while others clearly do...

By Dejan Lukan, 21 November 2014, 0 comments. Categories: Security, Vulnerabilities.

Salesforce customers: Learn from Code Spaces’ swift demise

Picture credit: iStockPhoto

A benchmark report by Adallom into the uptake of software as a service (SaaS) applications has found that Salesforce customers have the highest percentage of privileged access users – and warned about the problems that may cause businesses.

On average 7% of users on Salesforce accounts are privileged or have admin access, compared with 4% for Google Apps, 2% for Box and 1% for Office 365, the other three services analysed.

The report gave a grave warning over the prevalence...

By James Bourne, 05 November 2014, 0 comments. Categories: Research, SaaS , Security.

7 reasons why cloud governance is a challenge: Should we eradicate shadow IT?

Picture credit: iStockPhoto

Another day, another report bemoaning shadow IT for cloud computing. SafeNet’s Challenges of Cloud Information Governance study, conducted by the Ponemon Institute, is the latest to put the blame of compromising data at the door of unapproved IT activity.

Shadow IT, which involves employees bypassing company policy on website and technology usage, has meant cloud security is “stormy”, according to the report. More than half (55%) of the 1,864 IT and IT security...

By James Bourne, 04 November 2014, 0 comments. Categories: Big Data, Research, Security.

China launches “Great Firewall” attack against iCloud

According to a report by web censorship watchdog Great Fire, China's infamous state firewall is performing a MITM (Man-in-the-Middle) attack against users of Apple's Cloud-based services. It is suspected the attack has been launched in response to Apple's new default encryption methods.

It is possible to circumvent the fake site using a VPN, or one of iCloud's many other IP addresses.

Since iOS 8, authorities can no longer bypass on-device encryption to gain access. The convenient timing of...

By Ryan Daws, 20 October 2014, 0 comments. Categories: Government, Security.

Edward Snowden advises users to move away from Dropbox, Facebook, Google

Picture credit: The New Yorker/YouTube

Edward Snowden has told an audience at the New Yorker Festival to “get rid” of Dropbox as it doesn’t support encryption or protect private files, instead opting for a service such as SpiderOak.

The whistleblower, who was taking part in a ‘virtual interview’ through Google Hangouts, also criticised Facebook and, ironically, Google, although conceded their efforts in keeping user data safe were improving.

Yet when asked what someone who...

By James Bourne, 14 October 2014, 0 comments. Categories: Security, Storage.

Why mistrust from the iCloud leak isn’t necessarily a bad thing

In a society that celebrates the public broadcast of an individual’s life through multiple mediums, the return to a more modest ideal may be the only way forward.

Increasingly over the last ten years or so, Millennials, and what some refer to as Generation Z, have been pressured to share intimate aspects of their lives over the internet. If you look back, there has been an interesting trend with this.

Facebook...

By CloudWedge, 09 September 2014, 0 comments. Categories: Security.

Nude celebrity photo leaks: Cloud expert calls for common sense approach

After news broke of a series of leaked photos of female celebrities on Monday morning, there have been a series of developments – with one expert calling for a common sense approach to cloud data.

Ivan Harris, cloud services development director at Eduserv, explained that “things will happen” despite the best laid plans.

“Nothing is 100% secure,” he told CloudTech. “What...

By James Bourne, 03 September 2014, 1 comment. Categories: Best Practice, Security.

4chan user reportedly hacks iCloud with nude celeb pics – as Google strengthens security

An anonymous hacker on the 4chan site has published a series of naked photos of more than 100 celebrities, including Jennifer Lawrence, Kate Upton and Mary Elizabeth Winstead, after reportedly hacking into the users’ iCloud accounts.

Even though the photos appeared to originate from iCloud devices – and even though 4chan users mentioned it – it’s not been confirmed that Apple’s cloud storage system provided the leak. Other theories are being banded about as to how the photos were...

By James Bourne, 01 September 2014, 3 comments. Categories: Compliance, Security.

Community health systems, HIPAA, and cloud hosting: The facts

On the heels of the recent Community Health Systems (CHS)  data breach, in which 4.5 million Personal Health Records (PHI) were compromised, the industry is abuzz about data security in the HIPAA Compliant cloud businesses.  Data breaches like the one at CHS are not the exception – they’re the norm.  The FBI warned that the healthcare industry is extremely vulnerable to hackers in a recent

By LogicWorks, 21 August 2014, 0 comments. Categories: Compliance, Security.