Site icon Haznos

Keeping Safe with Cloud Hosting

<p>Cloud technology is taking us by storm&comma; whether you like it or not&period; Apple are working hard to convert their entire customer base into avid iCloud users &lpar;it is only a matter of time until your computer&comma; tablet and smartphone are cloud- connected&rpar;&comma; Google’s operating system is cloud-based in its entirety&comma; and Windows 8&comma; due later this year&comma; is the most cloud- focused operating system to date&comma; laying much stress on SkyDrive and its integration with Hotmail and various social networking sites&period; Whilst this new technology makes it easier to access information&comma; share files&comma; perform remote operations&comma; and back up data regularly&comma; we may be facing a new reality in which cloud hosting has dangers as well as benefits – where our highly coveted documents&comma; contacts&comma; and other personal data may not always be as safe as we think them to be&period;<br &sol;>&NewLine;Take the recent case of Mat Honan&comma; a former Gizmodo reporter who fell victim to a cloud-hacking operation when his daisy-chained web of accounts was snatched by highly adept pranksters&comma; motivated by nothing more than provoking his anger and that of his Twitter entourage&period; Within the space of an hour his Google account was deleted&comma; his Twitter account defaced by racist messages&comma; and his iCloud broken into&comma; resulting in a remote wipe-out of all the data on his iPhone&comma; iPad&comma; and MacBook&period; Honan lost all his work&comma; as well as his entire list of contacts&comma; who were now at the hacker’s disposal&period;<br &sol;>&NewLine;Whilst uncommon&comma; an operation at such level is extremely alarming&period; To say none of us would want to be in Honan’s shoes would be an understatement&period; How should we&comma; then&comma; keep safe when using cloud-hosted accounts&quest; A few tips may help&colon;<br &sol;>&NewLine;First&comma; keep your accounts separate&period; Emails&comma; phone numbers&comma; photos&comma; and other personal information do not need to co-exist on one interconnected account&period;<br &sol;>&NewLine;Second&comma; backup&comma; backup&comma; backup – not only within the cloud &lpar;admittedly a mistake made by Honan&rpar;&comma; but also outside it&comma; as hackers cannot target information stored on a drive in a secret location&period;<br &sol;>&NewLine;Third&comma; use the two-factor authentication for email accounts&period; The greater variety of detail required to access your personal data&comma; the harder your account will be to break into&period;<br &sol;>&NewLine;Fourth&comma; be extremely careful with your Apple ID&comma; and the amount of control you assign to it &&num;8211&semi; an All-In–One isn’t always the ideal option&period;<br &sol;>&NewLine;We can find further reassurance in the aftermath of Honan’s case&period; Investigations by Apple and Amazon reveal that the hacker used both companies’ telephone support to obtain sketchy pieces of information about Honan &lpar;such as his billing address and partial credit card details&rpar;&period; In each phone call the hacker acquired more data&comma; allowing him to move on to the next step of his operation&period;<br &sol;>&NewLine;Apple ultimately conceded that some of their basic operations and policies &OpenCurlyQuote;were not followed completely’&comma; and that stronger measures will be taken to protect their customers’ valuable data&period; Similar encouraging news came from Amazon&comma; who announced similar actions to &OpenCurlyQuote;close security gaps’ in their service&period;<&sol;p>&NewLine;

Exit mobile version