Tagged: Cloud Security

Federal Workers Are Not Protecting Their Mobile Devices

More than 40 percent of government employees are putting themselves and their agencies at risk with their mobile device habits, according to Cisco and the Mobile Work Exchange’s report “The 2014 Mobilometer Tracker: Mobility, Security, and the Pressure In Between.” As part of the study, an assessment tool called the Secure Mobilometer was developed to understand mobile (in)security and vulnerabilities.  The tool provided insight into the mobile device habits of government agency employees. The results show one singular truth: government employees and agencies need to take significant steps to secure confidential data.

The EFF Has Your Back

The tide is changing online, and companies need to make a commitment to users that their information is just that, theirs. Helping with this promise is the Electronic Frontier Foundation (EFF).  They have released an annual report titled, “Who Has Your Back?” taking a closer look at the privacy policies of major Internet companies. Read on to learn which companies are protecting your privacy.

How Hackers Used Malware to Steal 40 Million Credit Card Numbers from Target

How did hackers steal 40 million credit card numbers from Target customers? How much money are the cards selling for on the black market? And what’s the best way to prevent your computer from getting infected with malware — and avoid becoming an identity theft victim?

Keep reading to learn the answers to those questions, as well as how to make it harder for cybercriminals to get their hands on your private data.

Cloud Chaos: What You Need to Know After Hackers Breach Dropbox, Evernote

Are you one of the millions of people who rely heavily on the cloud-based features of Dropbox and Evernote?

The two services make data available no matter where a user is located, but the programs are apparently not safe from the same kind of hacking and data breaches that afflict banks, schools, and every-day consumers. Click to find out what kinds of breaches recently affected both companies.

Internet Crime Law Proposed in Minnesota to Combat ‘Cloud Hackers’

The movement of personal and business data to “the cloud” is attracting hackers who can exploit weaknesses in cloud-computing laws, and that’s why Minnesota Senator Amy Klobuchar plans to introduce a bill to make cloud computing a little safer. This article and video on a local CBS news affiliate explains that social media sites like Facebook and Gmail are among the most popular cloud services, storing data and programs on data centers connected through the cloud.


CTIA Wireless Recap: Tablets, Trinkets, and Technology

Back from the recent CTIA Wireless conference, CEO Kent Lawson tackles the trends and technologies shaping our future. He says things such as cloud computing are moving so quickly that “we will soon be accustomed to very large-scale capabilities which we will be carrying around in our pockets or purses.”


Facebook and Other Online Privacy Shockers: Should You Be Afraid of ‘the Cloud?’

Did you know that Facebook claims legal ownership of whatever we upload to them? Turns out you have no right to retrieve your information or any ability to permanently delete it. As CEO Kent Lawson reports in this article, that is just one example of a “downside” to sharing data, photos, or other sensitive personal information via “the cloud,” which is simply a metaphor for the Internet. Not ready to lose control of your personal information? Then keep reading to learn more about “the cloud” — where it’s been and, more importantly, where it’s going.

cloud computing

Government Agency Defines ‘Cloud Computing’ Security, Privacy Standards

If you’ve ever shared your Google calendar or created a Google document, for example, you have been “on the cloud,” an effort to create shared documents from any location. But there are major security risks to sharing documents over a public cloud network, and that’s why a government agency has issued its own set of security warnings.

Wifi Wireless: Security Researcher Questions Network Protection

A computer programmer has allegedly figured out how to break into Amazon.com’s cloud computing network to effectively hack into other people’s computers. According to news agency Reuters, the researcher uses specialized software to “test 400,000 potential passwords per second using Amazon’s high-speed computers.” For better protection against hackers, remember not to use simple passwords to secure your network.