ALL >> Computers >> View Article
Heartbleed Causes Cloud Security Woes
Revelations about the OpenSSL vulnerability Heartbleed raised new concerns this week about the security of major cloud providers Amazon, Microsoft, and Google. While the focus so far has been on consumers and sites they use, many companies are equally at risk since cloud services using SSL to secure data and account credentials. “The threat posed by Heartbleed is the biggest breach we’ve dealt with this year,” Jason Hoff, Director of Security at Amarin Pharmaceuticals said.
Heartbleed is a vulnerability in OpenSSL, the encryption used to protect data transmitted between end users and web providers or cloud services. A simple exploit allows an attacker to view data unencrypted, including the contents of messages and even usernames, passwords, and encryption keys. Using these tools, an attacker could compromise an account, or even impersonate a cloud provider, which is a big problem for Cloud Security in an industry faced with tough questions over whether it can meet the security requirements of enterprise customers.
Skyhigh Networks, a cloud security provider did ...
... research across thousands of cloud providers and found that 368 services are still vulnerable to the Heartbleed bug, even 24 hours after the problem was first widely publicized. Across 175 companies, the survey found that 96% of companies were using at least one service vulnerable to Heartbleed, including the leading CRM, HR, ERP, marketing, analytics, and backup cloud providers.
Many companies still need to assess their exposure to Heartbleed including data that may have been compromised in cloud services used by employees. There are several steps companies need to take in order to find out what their risk is, and then remediate any potential damage to improve their Cloud Security. First, they need to identify which cloud providers they use were impacted by Heartbleed. Second they need to identify when the provider has patched the bug and then change their passwords.
Going forward, many corporate IT departments are looking for steps to proactively prevent these types of breaches. One approach is using multi-factor authentication. When enabled, users login using their username and password, then they must enter another pass phrase or code, generated by a small device or phone, or sent to them via text message. An attacker with just a username and password, but without access to the mobile phone would be unable to login to an account.
Author :
Skyhigh Networks, the Cloud Security Services company, enables companies to embrace Cloud Security Services with appropriate levels of security, compliance, and governance while lowering overall risk and cost. With customers in financial services, healthcare, high technology, media, manufacturing, and legal verticals, the company was a finalist for the RSA Conference 2013 Most Innovative Company award and was recently named a "Cool Vendor" by Gartner, Inc. Headquartered in Cupertino, Calif., Skyhigh Networks is led by an experienced team and is venture-backed by Greylock Partners and Sequoia Capital. For more information, visit us at http://www.skyhighnetworks.com or follow us on Twitter@skyhighnetworks.
Add Comment
Computers Articles
1. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | RackoonaAuthor: Rackoona
2. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller
3. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp
4. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan
5. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru
6. Web Scraping Christmas Holiday Liquor Demand Surge Data
Author: Den Rediant
7. A Step-by-step Guide To Launching Your Own White Label Gojek Clone App
Author: Swiza Joy
8. City Brawl: Fight Through The Streets
Author: citybrawl
9. Consigned Pcb Assembly
Author: circuitcardassembly
10. Precision Cnc Outcomes Driven By Advanced Jig And Fixture Design Practices
Author: Johan Vick
11. Gmail Recovery Without 2 Step Verification
Author: bhectorblog
12. Why You Should Never Rely Only On Free Antivirus Tools
Author: Arjun
13. Portable Gaming Computer
Author: Jack Williams
14. One Identity To Rule Them All? It’s Closer Than You Think
Author: Tushar Pansare
15. Quinoa Market: Growth Dynamics, Trends, And Future Outlook
Author: komal






