ALL >> Computers >> View Article
Heartbleed Causes Cloud Security Woes
Revelations about the OpenSSL vulnerability Heartbleed raised new concerns this week about the security of major cloud providers Amazon, Microsoft, and Google. While the focus so far has been on consumers and sites they use, many companies are equally at risk since cloud services using SSL to secure data and account credentials. “The threat posed by Heartbleed is the biggest breach we’ve dealt with this year,” Jason Hoff, Director of Security at Amarin Pharmaceuticals said.
Heartbleed is a vulnerability in OpenSSL, the encryption used to protect data transmitted between end users and web providers or cloud services. A simple exploit allows an attacker to view data unencrypted, including the contents of messages and even usernames, passwords, and encryption keys. Using these tools, an attacker could compromise an account, or even impersonate a cloud provider, which is a big problem for Cloud Security in an industry faced with tough questions over whether it can meet the security requirements of enterprise customers.
Skyhigh Networks, a cloud security provider did ...
... research across thousands of cloud providers and found that 368 services are still vulnerable to the Heartbleed bug, even 24 hours after the problem was first widely publicized. Across 175 companies, the survey found that 96% of companies were using at least one service vulnerable to Heartbleed, including the leading CRM, HR, ERP, marketing, analytics, and backup cloud providers.
Many companies still need to assess their exposure to Heartbleed including data that may have been compromised in cloud services used by employees. There are several steps companies need to take in order to find out what their risk is, and then remediate any potential damage to improve their Cloud Security. First, they need to identify which cloud providers they use were impacted by Heartbleed. Second they need to identify when the provider has patched the bug and then change their passwords.
Going forward, many corporate IT departments are looking for steps to proactively prevent these types of breaches. One approach is using multi-factor authentication. When enabled, users login using their username and password, then they must enter another pass phrase or code, generated by a small device or phone, or sent to them via text message. An attacker with just a username and password, but without access to the mobile phone would be unable to login to an account.
Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. What Identity Governance Really Means In Modern EnterprisesAuthor: Mansoor Alam
2. Strategies For Successful Site Selection In Clinical Trials
Author: Giselle Bates
3. Simplifying Business Purchases With Smart, Reliable Procurement Solutions
Author: suma
4. How Businesses In Dubai Are Scaling Faster With Modern Erp Software
Author: Al murooj solutions
5. How To Choose The Right Weapon Tracking System: 7 Must-have Features
Author: 3PL Insights
6. Power Bi Tutorial For Beginners: Learn Business Intelligence Step By Step
Author: Tech Point
7. Spark Matrix™: Data Governance Solutions
Author: Umangp
8. How Prediction Market Software Development Is Transforming Data-driven Decision Making
Author: david
9. Naming Development & Management
Author: brainbell10
10. Mysql Database Development & Management Services
Author: brainbell10
11. Mongodb Development & Management
Author: brainbell10
12. Spark Matrix™: Conversational Automation
Author: Umangp
13. How Care Home Software Helps Improve Daily Operations In Care Homes
Author: Centrim Life UK
14. Pc & Tech Stores: Latest Trends In Hardware And Accessories
Author: Jack Williams
15. The Infozed Blueprint: Powering The Modern Workspace
Author: suma






