In The Clouds: Extended Connectivity Paves The Way For ID Theft
The cloud allows us to reduce capital and operations costs, and can save us time backing up our personal and professional information. In 2012, CloudHypermarket.com predicts that cloud computing will account for 25% of all IT expenditures, and 70% of those who use it report that it simplifies the IT management process. However, like all major advancements, when the door of progress is opened, problems slide through with it. Criminal minds are always waiting to capitalize on the underbelly of the latest technology.
Only As Safe As The Network You’re On
IT analyst firm Gartner predicts that 40% of businesses will make proof of independent security a condition for using any type of cloud service. Furthermore, 50% of Global 1000 companies will have customers’ personal information stored on the public cloud. Edward Haletky is a security analyst of the Virtualization Practice, and explained at the “Hacker-Halted” Cyber Security Conference in Miami that the cloud is only as secure as the networks we use it on.
In other words, your local coffee shop, campus wifi and public libraries that operate on open, unsecured connections means that access to your machine is open an unsecured. Haletky cautions “You’re going to have the possibility of identity theft, fraud perpetrated in your name because of identity theft. I mean that’s prevalent.”
Smart Phones That Aren’t: Expanded Connectivity
The cyber security firm reports that in 2011, 6.6% of smartphone users were victims of identity theft, and that’s a trend that will continue as more of our devices become “smart.” The same technology that connects our car to our laptop to our smartphones to our GPS could open us to risks.
Cyber thieves are targeting non-computer, cloud-accessible devices on an increasingly alarming level, as people tend to be less concerned with IT security when it comes to their auxiliary devices. In fact, malware can easily be installed on any Android smartphone and is able to record calls, take over the device, and even pinpoint its location.
Keep Your Stuff Safe
As daunting as ID theft stats are when it comes to cloud computing, the prognosis isn’t as grim as it can seem. There are simple ways you can keep your devices safe from hackers, phishers and identity thieves.
- Do not use the same password across the board and avoid using obvious passwords such as: password, 1234567, abc123, password1, password2, etc.
- Sign up for an identity theft protection program. Typical programs cost around $10 to $20 per month, depending on the level of security.
- Double check automatic encryption by going into your browser’s setup (look under “Options” or “Tools,” and look for encryption options, which might be found in an “Advanced” tab).
- Use secure browsers all the time.
- Never open unknown files. This seems like a given, but even the smartest among us have fallen victim to it as hackers find better ways to trick us.
- Install anti-virus software and updated it every time you receive a push notification from your vendor.
As digital technologies become more prolific and part of every facet of our lives, each time we embrace new technology, we need to ask: How does this make me vulnerable to thieves and how can I protect myself from identity theft?
© 2013, SaaSChronicles. All rights reserved.
Leave a Reply
You must be to post a comment.