Twitter breach revives cloud security fears
Some interest groups are urging Los Angeles to rethink its plan to implement Google Apps.
Computerworld - Last month's breach of a hosted Google Apps implementation used by Twitter Inc. has heightened fears in some quarters that cloud computing could pose significant security and privacy risks to users.
The Twitter breach gave a hacker access to confidential company documents via an employee's work Gmail account that had been hijacked through the password reset feature.
Shortly after the breach, some public interest groups and local law enforcement officials cited potential security concerns in calling on the city of Los Angeles to reconsider plans to replace its Novell GroupWise e-mail and Microsoft Office software with Google Inc.'s hosted e-mail and office productivity applications.
The $7.25 million migration project is set to begin later this year after its expected approval by the Los Angeles City Council. City officials have projected that the move to Google Apps will save about $13 million in software licensing and personnel costs over a five-year period.
Consumer Watchdog, an advocacy group based in Santa Monica, Calif., said the Twitter incident raises questions about whether "Google's cloud as offered provides adequate safeguards." In a letter to several Los Angeles city councilors, the group urged that city IT personnel first test Google Apps with a small group of users, rather than following the current plan of implementing it for 30,000 users by the end of this year.
"Before jumping into the Google deal, [the city council] needs to insist on appropriate guarantees -- for instance, substantial financial penalties in the event of any security breach," John Simpson, a Consumer Watchdog project manager, wrote in a blog post.
In a letter sent to Los Angeles Mayor Antonio Villaraigosa on July 16, the World Privacy Forum encouraged the city to move "slowly and cautiously" in implementing Google Apps, citing "considerable legal uncertainty about the status of data in a cloud computing environment."
Matt Glotzbach, director of product management for Google Enterprise, said the angst voiced about Google Apps and the Los Angeles project is based on incomplete information. "From what I know of the city's operation, this is a security upgrade," Glotzbach said. "Those who may be unfamiliar with cloud computing see this as a security risk simply because it is new and because it is something different."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts