The Covid-19 pandemic forced many individuals to work at home, so it’s not surprising that there was a sharp rise in the use of the cloud for storing information. There are risks with using cloud resources, but they can be managed with some simple steps. Here are 6 tips for staying safe in the cloud.
- Use strong passwords and 2FA. Passwords will be the key to accessing data in the cloud, so passwords should be complex, unique, and not used for any other site or service.
- Research the Cloud provider and read the user agreement. Yes, it’s not glamorous, but it’s important to understand if the cloud provider you’ll be working with has a good reputation and also how they will store and protect your data.
- Encrypt your sensitive files. Certain cloud providers can encrypt your files before they are stored or give you the option to encrypt individual files.
- Sign out of cloud services when not in use. It’s convenient to stay signed in to a cloud service, but it’s safer to sign out when you’re done. And avoid using shared computers and having your browser remember your cloud passwords.
- Backup your data. Just because you store data in the cloud doesn’t mean it can’t be lost. In fact, almost all cloud storage provider agreements specifically state that your data safety is not guaranteed. There are cloud-to-cloud backup solutions as well as local backup solutions available.
- Keep personal and company cloud data separate. Use personal cloud services to store personal data and files. If available, use your company’s provisioned cloud storage solution for any work-related files.
Everyone stay safe out there!
Sun Tzu, the famous 5th century BC Chinese general and philosopher has been credited with the statement ‘know yourself, know your enemy and you shall win a hundred battles without loss.’ This applies to cyber-criminals, too. A critical part of your organization’s defense is understanding the extent and nature of the threat. Here’s an example of what I mean.
We recently installed a server for a client which communicates directly to and from the Internet. While it’s a given that adequate security needs to be in place, many business people don’t realize the extent to which the bad guys will go to gain access to a system like this. Cybercriminals deploy automated systems to silently scan for computers, routers, and other IT-related devices which are connected to the Internet and once found, automatically and continuously attempt to exploit configuration mistakes, default or ‘easy’ passwords, and unpatched vulnerabilities.
After only 1 day, here’s a summary of the individual attempts to hack this single system:
Russian Federation (18)
Note that because of the software we installed, after an attack was attempted 3 times that address was blocked from further access. So the above total of 168 individual attempts in 24 hours – if not stopped by the software we had installed – would have likely been continuous attempts every few seconds by each attacker. This would likely have put the daily total at close to 300,000 – 400,000 attempts.
The takeaway? Don’t underestimate the enemy. They have resources to find your systems, exploit vulnerabilities, and make your life miserable.
Invest in good quality security, keep systems and hardware up to date, and monitor everything.
Everyone stay safe out there!
Most likely you were affected by last Friday’s DDoS attack. Everyone awoke and found many popular Internet sites slow or unresponsive. This was due to a multi-pronged attack against Domain Name Service (DNS) provider DynDNS and on Amazon Web Services. Affected sites included Twitter, Spotify, Soundcloud, and many others.
Without getting into too much technical detail, a DDoS attack utilizes thousands of compromised systems to flood a service – in this case Dyn and AWS – with so much traffic that its servers are overwhelmed trying to respond to it. It took Amazon and Dyn a couple of hours to restore normal operations.
The exact cause and ultimate size of Friday’s attack hasn’t been pinpointed yet, but other recent attacks were conducted by compromised Internet-of-Things (IoT) devices – think toasters and refrigerators with built in connectivity. I’ve been amused by the predictions of how IoT will take over the world without any problems when as yet we can’t even effectively manage security on the much smaller number of devices we already use. IoT devices use very simple embedded operating systems – most with minimal security – and many with undocumented embedded backdoor access mechanisms from their manufacturers.
So what can be learned? A couple of things.
First, a reminder. If you are 100% reliant on Cloud services, you have to be prepared for downtime and have a plan for how you’ll respond.
Second, be very careful with IoT devices on your business network. Heck, be careful with them on your home network. Most offer no option to monitor or manage what they are doing or what information they are collecting. If you have IoT devices that you want to leverage at your business, plan to deploy them securely on an isolated network.
Finally, consider updating your employee policies to cover bringing these devices into your organization. This is similar to employees bringing in their own wireless notebooks/tablets/etc., but now there can be many more varieties of devices.
Interested in learning about what the Cloud can cost and how secure it is? Check our Part 2 of my interview with Gillian Burdett on CBS Pulse.
And if you missed Part 1 where I talked about the benefits of Hybrid Cloud deployments, you can find it here.