您现在的位置是:Don't let your cloud cybersecurity choices leave the door open for hackers >>正文
Don't let your cloud cybersecurity choices leave the door open for hackers
后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden8人已围观
简介Image: Getty ImagesCloud applications and services provide access to business tools, information and...
Cloud applications and services provide access to business tools, information and software from anywhere, allowing employees to be productive whether they are working in the office, remotely or a combination of the two. Location doesn't matter; everything they need is just in 'the cloud'.
Special Feature
Securing the Cloud
Cloud computing is now a business essential, but keeping your data and applications secure is vital. Find out more about cloud security in this ZDNet special report.
Read nowBut it isn't only employees and businesses who have benefited from the use of cloud computing and the shift towards remote working – it's proving useful for cyber criminals and malicious hackers too, giving them a new set of opportunities to steal sensitive data such as credit card information, passwords, secret intellectual property and more from unwary cloud users.
Security
- 8 habits of highly secure remote workers
- How to find and remove spyware from your phone
- The best VPN services: How do the top 5 compare?
- How to find out if you are involved in a data breach -- and what to do next
But they might not even need to trick a middle-party to launch a cyberattack; research suggests that as many as 99% of cloud users, services and resources provide excessive permissions. In the vast majority of cases, these permissions, like admin rights, are never required, especially for standard users.
But if cloud services are misconfigured and admin rights are available where they shouldn't be, hackers can use a simple password as a stepping stone to modify, create or delete cloud environment resources, as well as using them to move around networks to help expand the scope of attacks. And if they hide any accounts they create, the affected organisation will be none the wiser.
This isn't some theoretical scenario: cyber criminals are actively abusing cloud services to infect networks with trojan malware, including Nanocore, Netwire, and AsyncRAT.
Cloud
- What is digital transformation? Everything you need to know
- The best cloud providers compared: AWS, Azure, Google Cloud, and more
- The top 6 cheap web hosting services: Find an affordable option
- What is cloud computing? Here's everything you need to know
One of the key aspects of cloud applications that cyber criminals abuse is weak passwords, so IT departments should do their best to ensure that employees are using strong passwords that can't easily be guessed and that, ideally, aren't used elsewhere. This approach makes it much harder for cyber criminals to breach accounts with brute-force attacks.
SEE: A security researcher easily found my passwords and more: How my digital footprints left me surprisingly over-exposed
Yet having a strong password won't stop attacks alone, which is why this strategy should be combined with multi-factor authentication (MFA) on all cloud-associated accounts. MFA provides an additional barrier to attacks that requires app-based, SMS-based or hardware-key verification from the user to ensure the attempted login is valid.
Show CommentsTags:
转载:欢迎各位朋友分享到网络,但转载请说明文章出处“后花园论坛社区|2024夜上海论坛网|爱上海419论坛 -- Back garden”。http://dzbz.com.cn/news/6813.html
相关文章
People are turning to ChatGPT to troubleshoot their tech problems now
Don't let your cloud cybersecurity choices leave the door open for hackersJune Wan/ZDNETJust a year ago, if you had a question about anything IT-related, you would have likel...
阅读更多
AI is more likely to cause world doom than climate change, according to an AI expert
Don't let your cloud cybersecurity choices leave the door open for hackersYuichiro Chino/Getty ImagesIf you've seen any science fiction movie, whether it's a classic like The...
阅读更多
ChatGPT: What The New York Times and others are getting terribly wrong about it
Don't let your cloud cybersecurity choices leave the door open for hackersNuthawut Somsuk/Getty ImagesOpenAI's ChatGPT, the artificial intelligence program that has been in a...
阅读更多
热门文章
- Microsoft to rebrand its partner program and focus resellers further around its cloud
- Microsoft and Cohesity are joining forces to fend off ransomware and other cyber threats
- AI computer maker Cerebras nabs TotalEnergies SE as first energy sector customer
- Microsoft and Cohesity are joining forces to fend off ransomware and other cyber threats
- How Formula 1 teams are using tech to find an advantage in a lower budget cap season
- How to use ChatGPT as a Siri shortcut on your iPhone or iPad
最新文章
The tech behind ChatGPT could power your next car's AI driving assistant
How to use Microsoft Edge's integrated Bing AI Image Creator
ChatGPT's success could prompt a damaging swing to secrecy in AI, says AI pioneer Bengio
How to use ChatPDF: The AI chatbot that can tell you everything about your PDF
Enterprises move to the edge, but the edge may not be ready
AI might enable us to talk to animals soon. Here's how