ALL >> Computers >> View Article
Heartbleed Causes Cloud Security Woes
Revelations about the OpenSSL vulnerability Heartbleed raised new concerns this week about the security of major cloud providers Amazon, Microsoft, and Google. While the focus so far has been on consumers and sites they use, many companies are equally at risk since cloud services using SSL to secure data and account credentials. “The threat posed by Heartbleed is the biggest breach we’ve dealt with this year,” Jason Hoff, Director of Security at Amarin Pharmaceuticals said.
Heartbleed is a vulnerability in OpenSSL, the encryption used to protect data transmitted between end users and web providers or cloud services. A simple exploit allows an attacker to view data unencrypted, including the contents of messages and even usernames, passwords, and encryption keys. Using these tools, an attacker could compromise an account, or even impersonate a cloud provider, which is a big problem for Cloud Security in an industry faced with tough questions over whether it can meet the security requirements of enterprise customers.
Skyhigh Networks, a cloud security provider did ...
... research across thousands of cloud providers and found that 368 services are still vulnerable to the Heartbleed bug, even 24 hours after the problem was first widely publicized. Across 175 companies, the survey found that 96% of companies were using at least one service vulnerable to Heartbleed, including the leading CRM, HR, ERP, marketing, analytics, and backup cloud providers.
Many companies still need to assess their exposure to Heartbleed including data that may have been compromised in cloud services used by employees. There are several steps companies need to take in order to find out what their risk is, and then remediate any potential damage to improve their Cloud Security. First, they need to identify which cloud providers they use were impacted by Heartbleed. Second they need to identify when the provider has patched the bug and then change their passwords.
Going forward, many corporate IT departments are looking for steps to proactively prevent these types of breaches. One approach is using multi-factor authentication. When enabled, users login using their username and password, then they must enter another pass phrase or code, generated by a small device or phone, or sent to them via text message. An attacker with just a username and password, but without access to the mobile phone would be unable to login to an account.
Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. Few Good Insights To Follow With Pc Gaming In Australia!Author: Jack Williams
2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy
3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders
4. The Rise Of User Centered Web Design
Author: goodcoders
5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders
6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech
7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech
8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech
9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech
10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech
11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech
12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech
13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech
14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech
15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech