Dark clouds gather over online security
The hacking of Google in China reveals an inconvenient truth about cloud computing
Computerworld - Google may have threatened to leave China in order to keep us all from concluding that "the cloud" can't be secured. But isn't that precisely what we should conclude based on the fact that Google chose to leave China?
Why didn't Google just fix the flaw and keep its mouth shut? If it thought it could protect its data and yours, wouldn't it have just done so?
In other words, the whole Google-in-China situation boils down to this: Google may have realized that it can't guarantee the security of its secrets — or yours.
It seems that all our data is moving to the cloud, especially for mobile computing users. Is it time to rethink cloud computing?
Threat: Insecure guardians of private data
What does Google know about you? Depending on which Google services you use, Google might know your exact location, what your e-mail says, what you buy online, what your schedule is, who you know, what your credit card numbers are, where you live, where all your friends and family live, what your interests are, what you read, what your voice mail messages say, who you talk to on the phone, the details of your health problems, your medical history and much more.
Google even offers a service called Google Email Uploader, which makes a copy of all your e-mail from Outlook or other desktop utilities and puts it into Google Apps, where it's backed-up and searchable. It also now offers a service whereby you can upload any file to Google Apps. Now even pre-cloud personal data is moving to the cloud.
Theoretically, all this personal information is safe. Although Google "knows" all of your information, no human would ever read it. Besides, do you trust Google with your information? That's a big question, but I would have to answer that by saying, "Yes, in fact, I do."
Unfortunately, if the China event tells us that the cloud can't be secured, it doesn't matter whether we trust Google or not. We would have to trust both hackers and anyone they might sell our private data to.
Review that list of what Google "knows" about you. Now imagine what others could do with that information: insurance companies, our government, "their" government, marketers, predatory financial services companies — not to mention blackmailers, identity thieves and extortionists.
Of course, hacking is nothing new. A recent survey by the Center for Strategic and International Studies found that more than half of IT executives report "high level" attacks on their companies. The difference with cloud computing is that a cloud service like Google's could offer one-stop shopping for hackers. If they hack one company, they have one company. But if that company is Google, they have everybody.
And it gets worse.
- Transforming Information Security: Future-Proofing Processes This report provides a valuable set of recommendations from 19 of the world'd leading security officers to help organizations build security strategies for...
- The Evolution of Corporate Cyberthreats Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted...
- 3 Questions to Ask Your DNS Host about Lowering DDoS Risks Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
- The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology...
- Establish Cyber Resiliency: Developing a Continuous Response Architecture Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or...
- An Incident Response Playbook: From Monitoring to Operations As cyber-attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. In this webcast, learn how to develop... All Cybercrime and Hacking White Papers | Webcasts