Currently set to No Index

Is Cloud Computing Behind the Twitter Hack?

The cloud is one of the hottest topics in the world of network computing and more recently, IT hosting and e-commerce.  Though it has proven to be a cost-efficient technology, the cloud does not come without flaws, especially if the latest high-profile internet security breach has anything to say about it.

The Infamous Twitter Hack

What is being dubbed as the “Twitter Hack” has some questioning whether security is an issue for the phenomenon that is cloud computing.  The incident that sparked the debate was actually the hacking of a Google Apps account belonging to a Twitter employee.  It has been reported that the exploit occurred because one of Twitter’s co-founders create a password for Google Apps that was easily guessed by a hacker.  This in turn, enabled the hacker to access the user’s personal information, including the data on his wife’s personal computer.

RELATED:   Robot Love

A War of the Words

Andy Cordial, managing director of data storage solutions firm Origin Storage, stated that a large number of companies and their employees are becoming victims of the cloud.  Cordial’s logic is that because cloud computing is so prevalent, businesses are being rushed into it and forced “to adapt their IT security systems on the fly.” He remarked that Origin Storage saw the shift in the business industry on the horizon and that all the security “breaches occurring on the cloud front” is proof that there are discrepancies that still need to be resolved.  Although the cloud shouldn’t necessarily take all the blame for the most recent debacle, the news isn’t certainly isn’t making anyone feel any better about the overall security of Twitter or Google Apps.

RELATED:   Future Uses and Growth of Cloud Computing

Evan Williams, the Twitter co-founder who essentially caused his wife’s Gmail webmail account to be compromised, explained to blog site TechCrunch, that the hack was absolutely not due to a lack of security on the part of Twitter.  However, Andy Cordial stressed that if Twitter would have paid more focus on security rather than growing their user base at all cost, the company wouldn’t be in the midst of a such an embarrassing situation.  Cordial added that implementing encryption into an organization’s data storage arrangement, be it in on or off the cloud, will ensure that information stored on the server and in transit is protected from malicious intent.  His final shot at the Twitter co-founder was that creating a secure password on top of encryption and sound corporate policies would have likely prevented the matter.  However, it should be stated that it was personal user accounts, not business accounts that were compromised.

RELATED:   Security Aspects to Watch for in Your Server Logs

Who’s to Blame?

Who should take the bullet for the so-called Twitter Hack?  Is it really the fault of the cloud, or should blame lie with Google apps or the victim?  While it is probably a good combination of all parties, one would think that a co-founder and active member of what is arguably the most popular social networking platform of the moment would have the know-how to be a little more responsible.   In any event, this breach probably will not convince many of the users who are still concerned about internet security any time soon.

How-to Start a Blog – Review of the Best 10 Blogging Platforms
How-to Start a Blog – Review of the Best 10 Blogging Platforms

If you want to start a blog as fast as possible, then you need to consider choosing a blogging platform. Thankfully, there are some excellent free and paid blogging platforms...

How Referral Marketing Can Benefit Web Hosts
How Referral Marketing Can Benefit Web Hosts

Even if the niche of web hosts are fully loaded with a lot of companies they are still one of the easiest to promote because you could write your own...

Broken Links: How to Find, Fix, and Benefit from Broken Links
Broken Links: How to Find, Fix, and Benefit from Broken Links

Links are what holds the web together. Essentially, the web is named as such because of the ability for pages and sites to link to other sources and relevant information....

Brand Value & the Most Powerful Brands (with Infographic)
Brand Value & the Most Powerful Brands (with Infographic)

Brand value – everyone wants it, however, only few are able to achieve it. The subject of “brand value” holds a significant position amongst marketers, executives, and entrepreneurs. Let’s discuss...

Reasons why your business should shift to Cloud hosting
Reasons why your business should shift to Cloud hosting

Cloud hosting has been on the rise since its inception. The improvement to your website performance and business efficiency that comes with Cloud hosting is almost tangible.

Why We Love the IT Support Career?
Why We Love the IT Support Career?

In almost all of my posts I was talking about the stressful side of the IT – the long hours, end user issues, migrations, midnight calls and the like. But...

IT Manager: Ways To Show Your Appreciation To Your Team
IT Manager: Ways To Show Your Appreciation To Your Team

Surely your team struggled hard and made things happen. You cannot say “this is what you get paid for” and just leave – you cannot keep your IT staff that...

Feeling Insecure In Your Current Job Position?
Feeling Insecure In Your Current Job Position?

Job security is one of our primary concerns. We everyday we live with the question of whether or not we will be working the next day. Loyalty is not the...

Leave a Reply

Your email address will not be published. Required fields are marked *