Every day, we share information knowingly or unknowingly, when using our mobile phones and computers. Some information may seem less important to us, but when connected to the internet, a detailed online profile of each person can be created. Do you know who can see your child’s photo after sharing it on a social network? Is it visible only to your friends or can it be seen by everyone? You wouldn’t show pictures of your child to everyone in person, would you?
News and media are almost daily publishing information about recent hacker attacks. The victims of these attacks were not only celebrities but also ordinary people. The latest cases of misuse of user data, for political campaign purposes, are also worrying.
Did you know, that every 39 seconds there is a hacker attack or that 95% of attacks are successful because of human factors?
Cloud services are also a common target of cyber attacks. Below we have listed major attacks launched in recent years:
Hackers apply different types of attacks. For example, in a ransomware attack, user data is held as a hostage. The hacker either gets the data, or prevents the user from accessing the data, and makes it accessible only on the condition that the user pays for it. This type of attack has increased by 250 percent since 2017.
Phishing is also a very common attack. The goal of phishing is to get user sensitive information such as passwords, login names, or credit card information. The attacker disguises themself as a representative of the service the user uses, and sends a false text alert to try to force the user to click on the link in the message and enter sensitive information. These messages are used in addition to email, text messages or social media.
Protection starts with the user and his or her online activity and usage of the right tools. In the following sections, we will describe how to protect yourself, when using different cloud services. In conclusion, you will find our list of recommendations that can help you to protect yourself online.
Secure the cloud service through settings
All cloud services use a certain level of default security, but it is up to the user to fine-tune the security settings. Cloud services, contain a wide variety of security settings, below, are listed the most common:
For further information click HERE. Keep in mind, that mentioned passwords are the first choice of the attacker when breaking into your account.
Basic safety rules to be followed by each user:
Article was published also at: Aktuality.sk, Teraz.sk, Nový Čas, Dobré noviny, Dnesky, Hlavné správy, 24hod.sk, Pán občan.
The Slovak weekly TREND, focused on economy and business, asked us to talk about the most interesting and innovative cloud solutions that we have d...
Our business analyst Monika Filingrová for the weekly magazine Trend on the topic of hybrid cloud.
Bratislava, November 14 (TASR) – Public cloud can help to improve public services for the citizens.
Aliter Technologies is developing its own senior monitoring system. The idea arose in the head of Aliter Technologies CEO Peter Dostál. He decided ...