By
Mark Ollig
In
light of the recently stolen celebrity data files from a popular cloud-based
storage server, I recall the words of Apple’s co-founder.
Steve
(Woz) Wozniak gave us a warning about using cloud-based storage two years ago.
“I
really worry about everything going to the cloud. I think it’s going to be
horrendous. I think there are going to be a lot of horrible problems in the
next five years,” Wozniak predicted.
In
2009, when public cloud-based computing was being discussed, yours truly wrote
how moving our applications and data to the cloud seemed inevitable.
At
the time, it appeared cloud-based servers were to be the next logical
progression in how we would store and access our data and programs.
Our
computing was moving onto the Web.
I
believed backing up the data inside our computing devices to the cloud made
sense.
Isn’t
having our data stored and accessible from an offsite location, within a data
server cabinet, inside a highly-secured room, the wave of the future?
We
are told there is no danger of losing our data. The cloud-based servers will
keep our data file information safe and secure.
Today,
we are learning the real danger is having our cloud-based data accessed by
unauthorized computer hackers.
It
was from inside Apple’s iCloud storage servers where celebrities’ personal data
(including scandalous photos) were hacked into and stolen.
Apple,
however, confirmed they found no evidence of any widespread problems with its
iCloud storage service.
“After
more than 40 hours of investigation, we have discovered that certain celebrity
accounts were compromised by a very targeted attack on user names, passwords,
and security questions, a practice that has become all too common on the
Internet,” Apple said in their media advisory statement.
Apple
advised its users “to always use a strong password and enable two-step
verification.”
For
more information on how to secure your Apple ID accounts, visit:
http://support.apple.com/kb/ht4232.
The
targeted attack on Apple’s cloud-based servers is no doubt giving some pause to
the users of iCloud.
A
user’s data stored in the iCloud is “safe and secure” insofar as the chance of
it becoming lost or unretrievable is concerned.
However,
this data can be, as Apple stated, “compromised” via unauthorized access by a
computer hacker.
This
latest data breach of data from the iCloud, along with the recent intrusions
into various well-known corporate data servers containing customer account
numbers and passwords, does not bode well for consumer confidence regarding
cloud-based storage of their personal data.
Even
though cloud-based data is stored securely, a potential hacker, or some
complex, algorithmic software program, has the potential to gain access to a
private user’s data files.
Years
ago, when a cloud was considered a white, puffy thing floating in the sky, we
were backing up our computer files onto external hard drives, 3.5-inch
diskettes, rewritable CDs, and those 5.25-inch thin floppy disks we stacked
like vinyl 45 rpm records.
Today,
many of our computing and smart mobile devices automatically sync and upload
our files to an Apple iCloud, or other cloud-based data storage service
provider such as: Microsoft, Google, Amazon, Carbonite, Mozy, or Dropbox.
Being
our computer files would now be automatically stored off-site, we thought we no
longer needed to worry about losing our data. The future was looking to be all
wine and roses.
It
is mind-boggling when one considers the large amount of personal information being
stored inside the cloud.
Think
of all the photos, text, and video we have uploaded to Facebook, YouTube,
Twitter, and all those other social networks we are using.
Chromebook
users are truly using cloud-computing, as they access their programs being
stored inside Google’s cloud-based servers.
As
we continue to send our data into online social networks and cloud-based backup
dataservers, we need to be asking more questions, instead of just trusting
everything will be alright.
Who
is authorized to access our data?
What
additional layers of security can be added to user accounts in order to be
better protected from their being hacked into and compromised?
How
are the cloud-based account password and security settings managed?
We
need to investigate how cloud-based service providers are securing our online
information.
The
Woz may be right, but it is up to us to take action to ensure our online data
is as protected as possible.
Let’s
start examining more closely the safeguards being used to store and protect our
cloud-based data.