top of page

A deep dig into darker clouds



In recent days, cyber threats have risen to the peak, resulting governments,enterprises, universities and hospitals to shut their operations.

Not many individuals were affected in India, compared to the rest of the world. But those photographers, editors and most of the engineers who use cloud space more often, would have faced some sleepless nights in fear. The fear was not about the work they load and rarely- unload, its all about the data's security. Since the beginning, when cloud service was launched, lights were shed on safety and reliability of their data stored in the servers, located in different locations of the world.But when the immediate leaks of actors, who have compromised international celebrities cloud accounts was learned, the preferred scale of the questions shifted from safety and reliability to security. However to an extent, the tech giants have tackled the crises by improving the security grade of the servers, they built, and by publishing regular updates, zipped with pile of security patches after some big threats and bug bounties in unusual-intervals. So far, none of the giants have answered the question raised, even by the US senate seeking a permanent solution to stay the hackers away from keeping their filthy hands on those indefinite cloud servers. But still, to shuttle the data without any boundaries and barriers, users relie on those big boxes. But by following the instructions penned below, the possibility of being hacked by those creepy hamsters could be reduced. *The first and foremost thing, one should have to do, is to log off the accounts to keep your accounts safe from reasonable hacks. * Be cautious in letting the people to know, where you are and and what you are doing. Because, a ransomware threat was reported last week citing geo-location as the cause of infection. So, turn off the geo-location, when you no longer need it. *Never underestimate the skills of those third party apps, which overlay on-screen more-regular. However, rarely they depend on information, which you have store on the servers, but when they(third part apps) are hacked, the actors will need that and could do anything with the information what you store through the same screen-laying technology. So, be cautious with those screen-overlayers. *Stay awake with the deal of not to enter your credentials, or store sensitive data on cloud, unless they are encrypted, *Try to use two-factor authentication, in addition to the traditional security system. These are the some of tips to prevent yourself from tipping a unethical person for his/er illegitimate actions against the files what you have stored.reats have rose to peak, resulting governments,enterprises, universities and hospitals to shut their operations for a while.Not many individuals were affected in India, compared to the rest of the world. Photographers, editors and preferably engineers who use cloud space more often, might have face sleepless nights than compared to those entrepreneurs. The fear was not about the work they loaded and rarely- unloaded, its all about the data's security, not safety. Since the beginning, when cloud service launched, lights were shed on safety and reliability of their data stored in the servers, located on different locations of the world.But when the immediate leaks of actors, who compromised mere international celebrities cloud accounts was learn, the preferred scale of the questions shifted safety and reliability to security. However to an extent, the giants have tackled the crises by improving the security grade of the servers, they own, and by publishing regular updates, zipped with pile of security patches after some big threats and bug bounties in unusual-intervals. So far, none of the giants have answered the question raised, even on US senate - a permanent solution to stay apart the hackers from keeping their filthy hands on those indefinite cloud servers. But still, to shuttle the data without any boundaries, have to relied on these big boxes. But by following some instructions left below, the possibility of being hacked could be reduced. *The first and foremost thing, one should have to do, is to log off the accounts to keep your accounts safe from reasonable hacks. * Be cautious in letting the people to know, where you are and and what you are doing. Because, a ransomware threat was reported with the infection of using geo-location as service to infect the system. So, turn off the geo-location, when you no longer in need of it. *Never underestimate the skills of those third party apps, which overlay on-screen more-regular. However, rarely they won't depend on the information, what you store on the servers, but when they(third part apps) are hacked, the actors will do anything with the information what you store through the same screen-laying technology. So, be cautious with those screen-overlayers. *Stay awake with the deal of not to enter your credentials, or store sensitive data on cloud, unless they are encrypted, *Try to use two-factor authentication, in addition to the traditional security system. These are the some tips to prevent yourself from tipping a unethical person for his/er illegitimate actions against the files what you have stored. 

Who's Behind The Blog
Recommanded Reading
No tags yet.
Follow "THIS JUST IN"
  • Facebook Basic Black
  • Twitter Basic Black
  • Black Google+ Icon
Search By Tags
bottom of page