Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

Understanding 2017’s Top Cloud Security Risks and How to Protect Your Data

February 2, 2017 No Comments

Featured article by Robert Cordray, Independent Technology Author

As the cloud becomes a more popular medium for individuals and businesses alike, many people are searching for new ways to break through cloud security and acquire more information. In order to ensure that you and your data are protected, you must understand the security risks and implement methods to protect your data that is stored in the cloud. Since over 70 percent of businesses operate in the cloud, it is more important than ever for those businesses and their customers to take the necessary precautions to protect and backup cloud data. Below, we have listed several of the risks that are inherent in cloud storage and offer some methods to keep that data secure:

Protect Every Device That Accesses Your Infrastructure

While “the cloud” seems like an abstract term, with no specific entry points, every device that accesses your cloud setup can pose a significant risk. A cloud is essentially a server that is accessed online through a device—whether a desktop computer, a laptop, a tablet, or a phone. If the device accessing the cloud is exposed, any information that is accessed on said device will be exposed as well.

To protect your data, encrypt every device that maintains access to your infrastructure. This is relatively simple on most operating systems. The settings of most devices include an option labeled “encrypt” or “protect your device.” Once an individual activates this option, they will have the opportunity to select a password. Make sure that password is secure—no fewer than 8 characters, with a mix of upper- and lower-case letters, numbers, and special symbols—and change it every six months or so.

Ransomware: The New Virus Standard

Ransomware is set to be the most influential virus of 2017. This growing threat generally involves a virus that is discrete, yet powerful. When your computer or network is infected with ransomware, usually when you unknowingly download a trojan or other virus, it lies dormant for some time before activating, then encrypts the files on your computer and denies you access. Once activated, the virus keeps your files locked you pay the hacker a ransom through a secure method. According to a report from digital security provider Blue Coat Systems, most ransomware users demand non-trackable “cryptocurrency,” such as Bitcoins, but one threat in 2016 interestingly asked for payments in the form of two $100 Apple iTunes gift card codes. Unfortunately the methods or protecting yourself from ransomware are few, but Blue Coat reports that new technologies will increase your protection as 2017 progresses.

One of the first lines of defense is to engage the services of a digital security firm and install digital security software. This software works by monitoring “untrusted” software like random files downloaded from the internet instead of a store like the Apple store. Many security firms have built a network among their users that check common programs that are downloaded to determine whether or not they are safe. As more users report a lack of negative effects, its trust level rises within the network. Meanwhile, files that show up as dangerous are reported and blocked. Other solutions keep a close eye on software that is downloaded from a source other than familiar sites such as the iTunes Store or the Android App Store. If the untrusted software modifies a certain number of files in a short amount of time, it will alert you and you can take the necessary actions needed to protect yourself.

Don’t Forget Your API

Almost every cloud service or application offers an application programming interface (API). In fact, the majority of IT professionals utilize APIs to communicate and interact with their firm’s cloud service. Unfortunately, APIs are at an increased risk because many of these APIs are available on the open internet. The risk increases exponentially if your IT department utilizes third-party APIs to modify the interactive interface you use for the cloud. Weak and unprotected APIs decrease the integrity, stability, and confidentiality of any service that is intertwined with it.

To prevent hackers from interrupting your API calls, utilize API authentication through a TLS protocol. This does not involve utilizing additional libraries; in fact, everything needed is generally included in most frameworks or language library. Alternatively, you can create a custom authentication process, which provides a higher level of security but has a more complex implementation process.

2017 is going to present many challenges that businesses must overcome. One of the best defenses is awareness of the threats that exist. Continue to research and study new threats as they arise and follow the evolving trends in cybersecurity. Fortunately, just as new threats arise every day, countermeasures to those threats also become available. Don’t hesitate to take the necessary steps to protect both your business data and your own personal information.

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech