Egnyte in the News!

"Shouldn't you be worried about cyberterrorism in the cloud?" By Vineet JainGigaOmSeptember 11, 2011The events of Sept, 11, 2011 opened the minds of CIOs to a Pandora's box of possibilities.A decade ago, tech executives had no concept of the magnitude of attacks that could take place on our own soil. For the first time, we became more aware of our vulnerabilities -- at our homes, in our country and within our IT infrastructure.After 9/11, businesses grew concerned about protecting both their data and their entire organization. The government reacted by implementing new, improved security and compliance standards. Over time, businesses' data became safer. Before 9/11, hackers would have to climb over a ten-foot wall to access company data. These days, it's more like a 100-foot wall.But in my opinion, we're not out of the woods yet. Just ask Sony, who hired a former Homeland Security official as chief data safety officer when more than 100 million accounts were breached. Or look at Dutch security certificate provider DigiNotar, from which hackers stole certificates for the purpose of spying on Iranian citizens. Then there was the 2010 Stuxnet worm, which was "so skillfully designed that computer security specialists ... were almost certain it had been created by a government and is a prime example of clandestine digital warfare," according to the New York Times."Cyber and economic means are edging toward the place where the truly are weapons of mass destruction," writes former Assistant Secretary for Homeland Defense Steven Bucci. Cyberterrorism has yet to be fully quantified, but the incidents speak for themselves: The trajectory of warfare is headed to cyberspace, and where there is war, there are terrorists.Should businesses be worried about cyberterrorist attacks? The answer is that they should be worried enough to stay proactive about security. For one, cybercriminals are more interested than ever in siphoning finances from businesses -- even small- and medium-sized ones that often don't have the elaborate security of their corporate counterparts. Looking forward, CIOs and IT managers need to think about who suffers most in today's form of warfare -- civilians. Now upload that to the cloud. That's reason enough to be prepared.The widespread adoption of cloud computing means that businesses need to be aware of how their service providers are protecting data in the cloud. Some people assume the cloud provides built-in immunity from attacks. It doesn't. But with the right protections, cloud service providers can provide solid defenses.All cybermisfits, from small-time pilferers to organized radical extremists, sneak into networks by exploiting weaknesses. A cloud service provider needs to protect those potential entry points. It should protect data in transmission and data at rest through encryption. Multifactor authentication will stop unauthorized users from breaking in via the username/password channel. The cloud provider should also scramble passwords, blocking wannabe cross-site request forgers and scripters. On the hardware side, CIOs should select providers with high-quality firewalls and routers, as well as first-class physical data center security.Finally, a cloud provider needs to offer good detection and logging. All unsuccessful login attempts should be detected and logged for review by the administrator. The cloud provider should retain log files and analyze them in real time. IT teams need to be given enough granularity in their administrative controls that they can proactively prevent unauthorized activity in the cloud. When administrators have the ability to choose who accesses the cloud, what they download, how often they change their passwords and so forth, they can look for patterns that indicate a breach.Let's say that despite a bulletproof cloud, an IT administrator forgets to update local software and an infection breaks in. If their organization adopted a hybrid cloud solution, this won't necessarily be cause for panic. With the hybrid cloud, IT teams can backup and synch files stored locally, meaning they already have a redundant storage system. When something breaks locally, it can easily be restored from the cloud.Cloud computing and potential disasters -- whether natural or terrorist-made -- are in the same circle of synergy. With a properly designed hybrid cloud that incorporates robust multilayer security, a single point of attack will not kill a business. when CIOs scrutinize the security of their cloud service provider in the same way they monitor internal security measures, they can feel confident they are truly being proactive about protecting their data.

Get started with Egnyte today

Explore our unified solution for file sharing, collaboration and data governance.

Protecting Sensitive Data with Egnyte in Today’s Threat Environment
December 12, 2023
Dawid Balut
Read Article
3 Reasons to Attend Bio-IT World 2023
April 27, 2023
Abhay Kini
Read Article
Author
Emily Ganz

View All Posts
Don’t miss an update

Subscribe today to our newsletter to get all the updates right in your inbox.

By submitting this form, you are acknowledging that you have read and understand Egnyte's Privacy Policy

Thank you for your subscription!

Welcome to
Egnyte Blog

Company News
Product Updates
Life at Egnyte
Industry Insights
Use Cases