Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Fast track changes in IT policy causing security breaches

Origin Storage : 17 July, 2009  (Technical Article)
Origin Storage believes that by forcing quick changes in direction of IT use, companies are leaving themselves open to security problems
News that Twitter has been hacked yet again comes as no surprise, given the fact that many IT staff and managers are being pushed into adopting Cloud Computing services on a fasttrack basis, says Origin Storage, the storage systems integration specialist.

'Our observations suggest that a number of companies and their staff are being forced down the Cloud Computing route and are having to adapt their IT security systems on the fly.' said Andy Cordial, Origin Storage's managing director.

'We have had concerns about this rate of change in the business sector for some time and, with all the data breaches occurring on the cloud front, it's obvious that the chickens are now coming home to roost,' he added.

According to Cordial, this latest Twitter hack appears to be the result of the password of a company co-founder being guessable on the GoogleApps service which then allowed the hacker access to his personal information including details of his wife's computer.

It is, he explained, a common problem in IT departments, but one that can be solved by applying a sizeable slice of common sense and adding a selection of encryption technologies plus policies to the mix.

Adding encryption to a company's data storage - whether in the cloud or not - he said, will ensure that data at rest, as well as on the move, is protected from prying eyes.

And if a secure password best practice is applied on top of corporate encryption policies, the resultant multiple layers of defence can help prevent human error causing a faux pas like the latest Twitter hack.

'Applying effective security is all about planning and then applying that planning, backed up by a set of solid security policies with encryption at its heart,' he said.

'If Twitter had had this strategy operating at all levels of its hierarchy, rather than apparently going for user growth at any cost, it wouldn't be in the embarrassing situation it is now,' he added.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo