Yes hackers love the cloud!
Cloud services aren't fundamentally vulnerable because they're badly
designed; they're vulnerable because they are used by people who can
easily be manipulated via social engineering. For a skilled hacker, a major company’s cloud system is a treasure trove
– sensitive data, including millions of bank account logins, email
addresses and Social Security numbers can be just a few clicks away.
While the cloud provides unprecedented benefits to digital businesses,
it can also leave customer and employee data vulnerable. If your business uses
cloud services and you don't educate your staff, you might as well kiss
your data and your reputation goodbye.
Major data breaches at tech giants like Yahoo ,
which confirmed in December 2016 that more than one billion of its email
accounts were compromised in August 2013, demonstrate that no company is
completely safe from a hack. Oracle, Sony, T-Mobile and Dropbox are just a few other consumer tech companies that have
dealt with massive hacks in recent years. Retailers such as Target,
Neiman Marcus and Home Depot have also experienced massive breaches of
customer data. And the average internet user, unaware of their data’s
vulnerability, has yet to take the necessary steps to protect their
information.
While the technical approaches to hacking have changed radically over
that time frame, the social engineering techniques needed to access
information remain fundamentally the same.
"What's different in cloud from a security view is when you're
renting software-as-a-service, you've given away the management of
security to a third party,""Do you want to outsource the responsibility for security? You can't
outsource the responsibility; you can only outsource the function. That
doesn't mean security can be ignored, because in the end it's your brand
and your reputation that's on the line if there's a data breach." "The big issues for a cloud-based model is the ability to largely log in
from anywhere, and the fact that's mostly delivered through a
browser,"
In most cases, the credentials are trivial. In most cloud environments,
there's no concept of intrusion detection or prevention, and if they are
there people don't know how to use them." Those technologies are also
meaningless if attackers blag legitimate login credentials through
social engineering. The problem with the cloud is that it simply expands the systemic
vulnerabilities that have existed since the Internet was developed. The
internet was built for redundancy, not security. So every single hack since then has been patched, but the
vulnerabilities remain and continue to increase. Until people take back
their data and assume responsibility for it, they have little recourse
against the large providers.The risk of losing key information in a cloud hack will only increase
as more companies and consumers embrace the technology. A recent study
by Skyhigh Networks, a cybersecurity firm, found that 18.1% of all
documents uploaded to cloud-linked systems contain sensitive data. In a poll conducted last October, 27% of respondents said they or someone within
their household had credit card information stolen from a store’s data
servers.
With so much raw data relegated to the cloud, major firms are
developing “machine learning technology” to automatically scan billions
of cloud interactions for potential threats. However, Stealing credentials by hackers can be accomplished through targeted attacks.
"Spear phishing is massively increasing as a primary entry point
technique. However, in many cases more basic techniques, such as ringing up and
pretending to be a worker who has lost their remote login credentials,
can be equally effective.
What can be done for protection. Turn users into a human firewall. Invest time and money into getting
users to understand why these attacks take place, that they are real,
and how to resist them. Even obvious steps, like ensuring the internet connection is encrypted
in public locations or using individual passwords for different
services, can provide a benefit. With the rise in identity theft, malware and phishing and scam sites,
users need to be more careful than ever for their cyber protection.The most important thing to do is choose strong passwords, and change them often.
No comments:
Post a Comment