Cyber Attacks

How to Keep Customer Data Safe in the Cloud

Article Written by Avery Phillips

Your customers are important to you and your business. Being of significance to you, it would be fitting for you to keep the customer data you obtain out of harm's way. At the same time, you are considering cloud services to accommodate the large capacity of not only customer data but company data as well. So, how do you enjoy the benefits of off-site cloud computing, while keeping your data safe?

Below are some of the biggest threats to data loss, cyber attacks, and otherwise questionable methods of obtaining sensitive data, and what you should watch out for to keep your customer data safe on the cloud.   

Data Breaches

In 2017, we saw very large companies fall victim to massive data breaches, unwittingly releasing sensitive customer data. Equifax, a major credit reporting agency and the hardest hit, revealed information of 143 million US customers. Your business holds very sensitive customer data such as credit card information, social security numbers, and birthdates - all which can be used to turn your customer's loss into a cyber attacker's gain.

Why Maintaining Your Online Security is Vital to Your Business

There is no doubt that threats from cyber attacks are a serious problem for businesses. Companies of all sizes have been the subject of attack, and it can lead to serious problems for customers and clients. Making sure that your companies security is high is important not only to your company as a whole but also for your customer's confidence. Here are some of the ways you can help to maintain the security of your company.

Consider Online Solutions

One way that you can increase your security is to transfer your systems to the cloud. By having all of your data and personal information off-site, you are protected by another level of security. It doesn't just work for your business systems; you can also use it for your servers. Instead of having your own server in the office, you can rent dedicated servers from many companies. It means you can essentially treat it as your own server, although you benefit from expert technical support, flexibility as well as heightened security.

McAfee Integrates Advanced Analytics to Increase Security Operations Center Efficiency and Protect Endpoints and Cloud

Grazed from McAfee

McAfee, one of the world's leading cybersecurity companies, today announced new endpoint and cloud solutions that go beyond machine learning to take advantage of the speed and accuracy of advanced analytics, deep learning and artificial intelligence, and increase efficiency of security operations. Cyber threats and the data needed to defend against them continue to increase, overwhelming security teams and driving the need for open, efficient security operations. McAfee's new solutions make use of the automation, reasoning and data curation uniquely provided by advanced analytics technologies, allowing security teams to easily discover and assess data and root out threats. Through human-machine teaming and an open and interoperable cybersecurity platform, McAfee proves ‘Together is power,' with collaborative security that defends against shared adversaries.

"Security teams are increasingly overwhelmed by the complexity they face in their environments which hinders their ability to defend against the growing number of threats," said Chris Young, CEO of McAfee. "McAfee is acting on our ‘Together is power' principle with collaborative security that combines the unique advantages of people, machines and partners enabling teams to be situationally aware of security events and take swift action to thwart assaults, from the endpoint to the cloud."

FileCloud Unveils 'Breach Intercept' to Safeguard Organizations Against Dramatic Increase in Cyber Attacks

Grazed from FileCloud

FileCloud, the cloud-agnostic EFSS platform, today announced FileCloud Breach Intercept. The newest version of FileCloud offers advanced ransomware protection to help customers handle every phase of a cyberattack: prevention, detection and recovery.

FileCloud is deployed across 90 countries and has more than 100 VARs and Managed Service Providers across the world. Deployed by Fortune 500 and Global 2000 firms, including the world's leading law firms, government organizations, science and research organizations and world-class universities, FileCloud offers a set of unique features that help organizations build effective anti-ransomware strategies.

Global ransomware damage costs are expected to total more than $5 billion dollars in 2017, compared to $325 million dollars in 2015. Ransomware is growing at an estimated yearly rate of 350 percent with business enterprises becoming the priority target for hackers. Enterprise File Sharing and Sync (EFSS) solutions have seen an increase in ransomware attacks with 40 percent of spam emails containing links to ransomware. Whereas public cloud EFSS solutions such as Box and Dropbox offer centralized targets for ransomware attacks, FileCloud's decentralized private cloud reduces your company's exposure to potential attacks.

Data Security Guidance for Small Businesses

With high profile cyber attacks occurring on a regular basis, people who run small businesses are becoming increasingly concerned about their data security processes. For regulated businesses, there is a requirement to provide evidence that the company complies with the minimum requirements. For small businesses that don't have the same level of scrutiny as the larger, highly regulated businesses it can be harder to find support and guidance on responsibilities. 

However, businesses of all sizes must start paying more attention to the threat of cyber attacks, given that the type of businesses that criminals are targeting varies from a small start-up business to a global company that is a household name. Recently we have seen numerous cyber attacks hitting the news headlines, such as payday loan company Wonga who was subjected to an attack, leaving 245,000 customers affected. 

Cloud Computing: Google, Facebook at Center of EU Clash Over Cyber-Attack Law

Grazed from Bloomberg.  Author: Kit Chellel.

Google Inc. and Facebook Inc. are caught in the middle of a clash between European Union lawmakers on whether the U.S. technology giants should be covered by rules forcing companies to report cyber attacks to government agencies in the 28-nation bloc.

While the European Commission wants search engines and social networks included in a revamped law on network and information security, some lawmakers favor a more streamlined approach focusing on critical infrastructure such as banks and power stations...

Cloud Computing: How Secure Is Your Small Business? 5 Tips to Protect Against Modern Cyber Attacks

Grazed from Entrepreneur. Author: John Mason.

Today, technologies like cloud computing, mobility, social, and big data and analytics are enabling small- and midsized businesses (SMBs) to do more with less, reach new markets and focus on creativity and invention instead of IT. But with all this new opportunity comes responsibility. Whether an SMB is moving to the cloud or implementing a bring your own device (BYOD) mobile program, security should be part of the plan.

Each year, cyber crime costs the economy about $445 billion, according to the Center for Strategic and International Studies, and SMBs can be attractive targets for hackers tapping into this profitable black market. SMBs tend to have weaker online security, use cloud services void of strong encryption technology and lack the robust IT and internal policies needed to protect against increasingly sophisticated cyber-crime rings, which operate with an enviable efficiency and effectiveness...

Read more from the source @

Cloud Computing: Palo Alto Networks - Proactively Averting Cyber Attacks

Grazed from SysConMedia.  Author: Charles Hall.

Cyber threats are becoming more advanced, persistent, and focused. The threat landscape is rapidly changing, and evolving faster than ever. Today it is difficult to determine who is winning: either those behind the cyber threats, or those fighting to prevent and remediate the threats. The strategy against cyber threats has been to throw more and more technology at the problem, in an attempt to keep up, and it is not working.

What if there was a way to prevent a cyber attack before it could ever happen? While no solution will prevent 100% of attacks, the goal should be to get as close as possible. Moving to a more proactive solution makes it increasingly difficult for attackers to achieve successful attacks...

Read more from the source @

Cloud Computing: The perimeter's breached - encrypt everything!

Grazed from SCMagazine.  Author: Tony Morbin.

Last year's slew of criminal data breaches made it clear that the perimeter has fallen and the privacy of our data is at risk – whether that be passwords and credit cards or celebrity pictures and corporate secrets, while government agencies from China, Russia and the west continue to demonstrate vast intelligence surveillance capabilities.

One of the most effective responses for corporations, governments or individuals is to take a data- centric approach using encryption, potentially making data useless to intruders, or at least, raising the cost of access.  Late last year SC Magazine UK editor in chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry view on issues in the commercial encryption market...

Cyber attacks move to cloud with increased adoption, report shows

Grazed from ComputerWeekly. Author: Warwick Ashford.

Cyber attacks on cloud environments have almost reached the same level as attacks on traditional IT, with increased adoption of cloud-based services by the enterprise, a study shows. The 2014 Cloud Security Report by security-as-a-service provider Alert Logic is based on an analysis of data from cloud and on-premise infrastructures of 2,200 customers.

In the past year, brute force attacks on cloud environments climbed from 30% to 44% of customers, and vulnerability scans increased from 27% to 44%, the study found. Brute force attacks typically involve a large number of attempts testing multiple common credential failings to find a way in, while vulnerability scans are automated attempts to find a security weakness in applications, services or protocol implementations that can be exploited...