Large cloud storage providers that pride themselves in the security of their cloud storage services (Amazon Web Services, Microsoft Azure, Google Cloud and Dropbox – to name the big guns) have only marginally changed the way individuals and companies manage their data. Only 10% of the world’s data is stored in the cloud! Which begs the question, why are companies, and individuals, hesitant to store “sensitive data” in the cloud?
Four motivators for cloud storage hacks (to name a few)
1. Political reasons: the Chinese Military being accused of being linked to cyber-attacks in the USA; or the case of Edward Snowden.
2. Controversial information leakage: (also known as “naming and shaming”): the Ashley Madison Hack; or the recent case of the Panama Papers.
3. Monetary gain: Gaining access to credit card and banking details for personal financial gain, or reselling information on the dark web. Examples like the Cardsystems Solutions Inc incident or the Sony Online Entertainment networkcome to mind.
4. Boredom or malicious vandalism: the Sesame Street YouTube channel disaster whereby Sesame Street’s YouTube channel has been taken offline after hackers uploaded several pornographic videos to it.
There will always be a weak link…
When one starts looking at the relationship between online security and cloud storage, the bottom line is that at some point every company will experience a security breach to their data stored online. The trick is as to how you prevent it, and if beyond the point of prevention, manage the damage (from the perspective of a cloud storage service provider). Managing cloud security controls is an ongoing practice. In a previous article we have outlined what is important to look for when it comes to data security and protection to try and mitigate the weak links in said security controls.
If you can’t beat them, join them!
A creative and proactive way for cloud storage providers to ensure data security is to actually employ ethical hackers, or to invest in hacker training for their software developers. “White Hat” hackers are ethical hackers who specialise in “penetration testing” and other forms of testing for vulnerabilities in cloud storage software and other Internet technologies. (The “FBI Apple encryption dispute” is an interesting topic for discussion regarding this.) If you want to prevent cyber-crime and protect your cloud storage as a company, you might need to enter the mind of a cyber-criminal in order to pre-empt and minimise security breaches.
As a customer, when you do choose cloud storage, make sure you have vetted your choice of provider properly in order to ensure the security of your data is up to standard.