*Breaches in Internet security are not the same as breaches in Cloud security

TechViews News   …..

News about hacked accounts is on the daily news…. Yahoo uncovered another 1 billion user accounts compromised, making it the largest breach in history. The Democratic National Committee’s email was hacked, as was the Hillary Clinton campaign’s and her campaign manager’s. Let’s not forget about Home Depot, Target, and all those IoT hacks as well.

What do these all have in common? Not one of them is a cloud-based attack.

Sloppy reporting confuses the internet with the cloud; as a result, people are not sure about the security of cloud storage and cloud based apps.

Yahoo is not Amazon Web Services, the DNC email server is not Microsoft Exchange Online, and no IoT device is a cloud.

Essentially, public cloud services have a fairly good record when it comes to breaches. Generally speaking, the public cloud is more secure than on-premises systems.

The vast majority of system breaches comes from password logins by hackers and thieves. And there’s an easy, simple way to fix that … better, stronger passwords.

Prime example: the email breach of John Podesta, Hillary Clinton’s campaign manager, was password based. The breach of his account opened to door to thousands of emails that meticulously described the corruption inside her campaign and the DNC.

And his password? It was “password”. Yup. Aside from her policies, that password is what ended the campaign of the Democrat nominee.

But let’s not confuse email breaches with cloud breaches. The issue of Internet breaches is really misreporting by journalists and bloggers that are not fully educated on how the Internet, and the cloud work.

To most people, the understanding is that everything that’s hosted on the internet is a cloud, but of course that’s not the case. Information stored in the cloud, and accessed from the cloud, is more open to governmental snooping than to outright data theft by hackers.

On-premises systems… not cloud-based apps and storage… have been the favorite target of hackers in the last several years. And organizations using applications in the cloud without a thought on security will find that their risk of hacking is about the same in the cloud as within the local data center. That’s not a risk from the cloud but from lazy and sloppy IT.

The security risks of the cloud platforms themselves are low, which is why hackers focus on your on-premises deployments instead.

There is a lot of misinformation, floating around, and that’s just what it is… misinformation. Sloppy reporting could be giving cloud computing an undeserved black eye.

So focus on getting your passwords strong to help stop hackers. That’s the real danger from danger breaches.

Be Safe – Backup Your Data Regularly!

**********

And don’t forget to take advantage of our FREE subscription to the TechViews.org Newsletter. A must-read if you are interested in Internet Security.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s