Addressing Cloud Computing Security Issues and Challenges – Part 3
Addressing cloud computing security issues and challenges is a complex subject and this series of blog posts barely scratches the surface. It all stems from the fact that when you store your files in the cloud, you are storing them on a computer that is owned by someone else. In the first two posts of this 3 post series we looked at issues of ownership, data residency, legal jurisdiction, legal access by law enforcement and third party control, access and inspection of your stuff. In this post we will take a look at the additional security considerations, breaches and outages.
People use the cloud to store documents, pictures and videos. In business, employees store spreadsheets, word documents and presentations, many of which contain company confidential or client confidential information. According to a study from Skyhigh of 18 million users, 21% of files uploaded to cloud providers contain confidential information such as personally identifiable information (PII), protected health information (PHI), payment card data, or intellectual properly and 34% of users have uploaded sensitive data to the cloud. One of the least recognized cloud computing security issues and challenges is that cloud storage holds a treasure trove of information from many users and organizations and is thus a honey pot and high value target for both hackers and national security agencies.
Probably the most publicized cloud computing security issues and challenges is that of the data breach. Google Drive, iCloud and Dropbox have all suffered different forms of data breach.
For example iCloud was recently breached using a social engineering (or phishing) attack. This is a vulnerability not from hacking Apple’s defenses, but from tricking users into giving up their user name and password credentials through a fake email and/or website. Once an attacker tricks you into giving up your username and password, they simply take on your identity to access your account. This is how hackers obtained explicit photos of Jennifer Lawrence from her iCloud account. It is hard for even the largest of cloud providers to defend against users giving up their credentials. To mitigate, you can either use a two-factor authentication process or encrypt the data you store in the cloud. Two factor authentication ranges from answering an additional security question to inputting a randomized PIN from an RSA token, but most people don’t want the inconvenience of an additional security step and think they are safe behind the sophisticated defenses of a Tier 1 provider. Encryption of data requires some degree of technical sophistication that average users lack.
In another example, in 2012, customer email addresses were stolen from a Dropbox employee’s account using credentials breached from hacking another site. Most people use the same password at multiple sites. Hackers know this and will go after soft, relatively unprotected targets to get passwords then use those passwords to get information from sophisticated sites that employ the best security. Likewise, hackers stole the credentials of almost 5 million accounts and published them online forcing Google to ask users to change their passwords. Most people believe they are safe storing their files with these large companies, but if a hacker tricks you into giving him your credentials or if they steal your credentials from a soft unprotected site, there is not much the cloud provider can do other than offer two-factor authentication.
Here are some headlines I found about big company cloud provider breaches. You can read them for yourself.
” Dropbox and Box leak files in security through obscurity nightmare” – TechRepublic
“Google Drive Found Leaking Private Data” – Collaborista Blog
“Dropbox Password Breach Leads To Mass Security Alert” – Huffington Post
“Dropbox confirms security breach” – Information Age
“iCloud leaks of celebrity photos” – Wikipedia
“Attackers use Google Drive, Dropbox to breach companies” – Help Net Security
“Google Drive phishing is back — with obfuscation” – CSO Online
Outages – The Cloud Will Go Down 
One of the cloud computing security issues and challenges that affects almost all users are the outages. True that as the cloud matures, cloud providers become more sophisticated and overall uptime improves, but there will be outages even from the biggest cloud players. Here are some notable outages over the past 3 years.
Google’s Infrastructure-as-a-Service was down in March 2015 for 45 minutes and February 2015 for 1 hour. In both May and March 2015, Apple’s iCloud was down for 7 hours affecting 200 million users. That followed an outage in June 2014 of several hours and August 2013 of 11 hours. In January 2015 Verizon took its cloud offline for 40 hours for maintenance.
Dropbox was down for 1 hour in March 2014, 2 days in January 2014, 90 minutes in May 2013 and 16 hours in January 2013. Google Drive was down 5.5 hours in March 2014, 25 minutes in January 2014, 5 minutes in August 2013, 40 minutes in July 2013 and 17 hours in March 2013.
Microsoft Azure cloud services was down twice in March 2015 for more than 2 hours. Amazon Web Services was down in for 7 hours in September 2015, as well as 49 minutes in June 2013, 1 hour in August 2013, and 2 hours in September 2013.
Even though adoption of cloud services continues to increase, outages like these are among the factors that hinder their full embrace. These outages are only a small example of what is going on. A host of other cloud services have also gone down such as Yahoo Mail, VMware, Jive, Microsoft BPOS, Microsoft Exchange, T-Mobile, Adobe Creative Cloud, Joyent, and Microsoft Lync. Smaller services have outages as well, but because they don’t affect as many people, aren’t tracked the same way.
Addressing Cloud Computing Security Issues and Challenges – The Better Way
There is a better way to address cloud computing security issues and challenges. The better way is access, share and stream from your own existing storage instead using FileFlex.
FileFlex enables secure remote access to all of your storage devices. It is differentiated from Enterprise File Sync and Share (EFSS) services through its proprietary file access virtualization technology. File access virtualization abstracts files from their physical locations to enable remote access of files from their source locations. The location of the file can be anywhere on a corporate infrastructure – corporate servers, server attached storage – Direct Attached Storage (DAS), Storage Area Network (SAN), and Network Attached Storage (NAS) – FTP, PCs, laptops, private clouds and virtual private clouds.
All your files can be accessed from any computer, any laptop, any tablet or any smart phone, from anywhere. You don’t have to build a private cloud or upload and sync files to a third party. FileFlex can be set up so that your data stays on your storage, on your premises, behind your firewall and under your control.
How to Get Started
FileFlex is free to try. Click here to see for yourself. To watch FileFlex in action, check out the video below.
Get it now