hack1

Enterprise Hacking Incidents Continue to Rise

Two Cloud-based service providers were hacked recently, demonstrating yet again that while companies are attempting to protect data and prevent data theft, additional steps have to be taken to truly secure private information stored and transmitted over the cloud. Both cloud-based customer support vendor Zendesk and cloud-based note-taking app company Evernote had their systems breached, and took steps to notify their customers via their company blogs. Evernote recommended a service wide password reset, affecting approximately 50 million people, after usernames, e-mails addresses associated with Evernote accounts, and encrypted passwords were accessed. Zendesk admitted on its blog that three of its customers had been affected and “we believe that the hacker downloaded email addresses of users who contacted those three customers for support, as well as support email subject lines.” News outlets quickly identified the three customers as Twitter, Pinterest, and Tumblr, each with a significant user base that could have been affected.

CipherCloud applauds both companies for taking steps to not only address the security vulnerabilities that affected the data loss, but to be up front with their users about the incursions instead of sweeping them under the rug and hoping no one would notice. Still, this is yet another example of the distributed nature of the cloud being abused by hackers out to gain access to sensitive information stored on the cloud. With an additional level of encryption of information before it is distributed over the cloud, any hackers gaining access to sensitive files would find nothing of value, and the companies affected wouldn’t have nearly as much egg on their face.

SUBSCRIBE TO OUR BLOG
Join over 5,000 subscribers - best practices and tips delivered weekly to your inbox.
We respect your privacy. Your email address will never be sold or shared with anyone else.
0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *