What the Recent Celebrity Photo Hack Can Teach Businesses and Consumers

Compare to Other
 
September 19, 2014

If you’ve been following the news lately, you have probably heard that a number of celebrities have had sensitive photos leaked on the Internet. It is believed that the photographs were obtained by hackers who were able to perform a brute force attack on Apple’s cloud storage service. This recent security breach demonstrates how important it is to exercise proper IT security measures when using cloud storage and mobile devices.

 

Everyone needs to understand that no matter what security measures are in place, there will always be a risk. Security experts have predicted that cybercriminals will be more interested in attacking data in the cloud than computer networks. As the cloud is now a part of life for both individuals and business users, we will need to be responsible about how we store data on mobile devices and cloud services.

 

Having a proper plan in place can lower the risks to you or your business. This security plan can be quite simple and consist of examining what type of data you are creating and sharing, what you are planning to use the data for, plus remaining aware at all times of the location where the data is going to be stored or collected.

 

Many companies should do a little bit more and create a detailed plan that will be shared with all users. This ensures that everyone is following the same policy, which can minimize the risk of data loss or unauthorized access.

 

Here are some things to do in both your personal and business life which will make using mobile and cloud-based data storage solutions safer.

 

1. Create rules about what is allowed to go in the cloud

Cloud services have risks, which means that certain types of data shouldn’t be stored there unless stringent protective measures are employed. Everyone in the company should know which data should or shouldn’t be stored in cloud services. For personal users, the same rules apply: avoid storing highly personal information on remote servers if you can.

 

2. Identify and address weak links in data-exchange chains

Weak passwords have always been a big problem. This is why they should be combined with 2 factor authentication methods for sensitive data. This can include call backs to a second phone number, biometrics and one-time-use passwords. Mobile devices should be appropriately secured and have a password on the lock screen, plus remote data recovery and wipe capabilities.

 

3. Know how to address a breach

Any organization should be prepared to face an accidental data loss. You should be able to quickly analyze how important the lost data is and what ramifications its loss will have. You should also create a plan that will determine who you should contact should a security breach occur, such as law enforcement, other users of the data and the owners or originators of the compromised files.

 

CertainSafe™ understands the concerns companies and consumers have surrounding data breaches and has been developing cutting edge software for more than 28 years, with 15 of those years spent designing technologically advanced solutions specifically geared toward security. Secure Cloud Systems™ has significant expertise and experience with payment data and Payment Card Industry (“PCI”) compliance. Our state-of-the-art proprietary solutions are unmatched in this space.

 

Additionally, our technological advances with non-payment data types, combined with our method for moving all data from CertainSafe™’s secure vault storage (which makes data safe, yet conveniently available to users in “Real-Time”) is un-paralleled. For more information about Certainsafe and our data security technologies, visit our website at https://www.certainsafe.com/. If you would like to correspond with us via email,
click here: contact us to send us an email today.