Written By: Steven E. Collins
Cloud computing is gained new ground every day across multiple levels and all sectors of industries. Cloud computing is the cutting edge of business technology because of its versatility in service and use. Businesses all over the world are making use of cloud computing to meet their requirement for a larger, faster and more easily accessible information storage system. Cloud computer also allow companies expandable storage space for a more reliable database infrastructure that can accessed remotely by different users across the globe. Statistics show that 65 percent of American companies moved to the cloud in 2011. About 64 of the companies who use the cloud system report lower wastage and a decrease in energy consumption. Cloud computing is definitely a game changer and one that allows smaller companies to compete with larger businesses and compete on equal footing, saving time, money and resources. But are there any risks to cloud computing that you need to cover?
Cloud computer security risks
The phenomenal popularity of cloud computer is followed by phenomenal security concerns. Since information that is stored by businesses on the cloud is usually sensitive, you want to take proper precaution against malware infection and to ensure that your cloud cannot be hacked into. Cloud security measures are in place and continue to improve but hackers are also getting smarter. Here are a few cloud security concerns you may face:
When you send or transfer data from your cloud, someone else might be able to read it if you haven’t encrypted your data. If your SSL is not properly configured you may risk a third person “eavesdropping” in a two-party communication on the cloud. The third person can “pick up” information that has been exchanged. Malware attacks can corrupt the entire data and hardware. Most of these security concerns can be overcome but the most important security risk lies in authentication.
Not too long ago, CNN, reported the story of Mat Honan, a writer whose iCloud account was hacked and all the data from his Mac, iPhone and iPad were wiped clean. While you might want to blame Honan for failing to comply with basic security protocols such as linking together his online accounts, the fact is that a hacker could easily get into his account through a few smart moves and smart thinking. The attacker, Phobia, placed a few calls to Amazon and Apple convincing both these companies that he was Honan by presenting information about his email address and his billing address. He then got access to the last 4 digits of Hanon’s credit card and used this, the billing address and the email id to convince Apple to reset the password for Honan’s iCloud account giving Phobia sole access to all of Honan’s data.
Two factor authentication solutions
This is why Telesign’s two factor authentication solutions are vital to your cloud security systems. Two-factor verification requires users to supply something that they know and something that they possess. In such a scenario, even if a hacker were to retrieve a password or something that the user has in possession such as a 4-figure pin number, or even in the case of Phobia, email information and the last 4-digits of a user’s credit card number, the hacker would not be able to access the account. The 2 factor authentication requires something that the user has and something that would be supplied to him at the time of access through his mobile. This would serve as a one-time password. Google has already given their users the option of a 2 factor authentication system. There’s a backup too in case their mobile is stolen. TeleSign can help you make your cloud extremely secure through its two factor authentication solutions. In 2011, online frauds amounted to a loss of $3.4 billion for online merchants. The two factor verification system from TeleSign protects accounts from being compromised by leveraging the phone as an authentication device. It will protect your account, reduce operating costs and provide users with a better experience!
Author’s Bio
Steven E. Collins is a web enthusiast and a baseball fan living in Los Angeles, CA. He has extensive experience in the field of Internet Security. He likes to share his knowledge through articles and blog posts on implementing security systems for online businesses. You can find him writing anything from best practices for online transactions to prevention of online fraud.