<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Rajiv Gupta | Vox</title>
	<subtitle type="text">Our world has too much noise and too little context. Vox helps you understand what matters.</subtitle>

	<updated>2019-03-06T11:04:45+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.vox.com/author/rajiv-gupta" />
	<id>https://www.vox.com/authors/rajiv-gupta/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.vox.com/authors/rajiv-gupta/rss" />

	<icon>https://platform.vox.com/wp-content/uploads/sites/2/2024/08/vox_logo_rss_light_mode.png?w=150&amp;h=100&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Rajiv Gupta</name>
			</author>
			
			<title type="html"><![CDATA[Mark Zuckerberg and the $80 million stolen password]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/6/7/11868648/stolen-password-cybercrime-hackers-mark-zuckerberg-bangladesh-bank-security" />
			<id>https://www.vox.com/2016/6/7/11868648/stolen-password-cybercrime-hackers-mark-zuckerberg-bangladesh-bank-security</id>
			<updated>2016-06-07T08:30:06-04:00</updated>
			<published>2016-06-07T08:30:03-04:00</published>
			<category scheme="https://www.vox.com" term="Facebook" /><category scheme="https://www.vox.com" term="Influence" /><category scheme="https://www.vox.com" term="Mark Zuckerberg" /><category scheme="https://www.vox.com" term="Social Media" /><category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[The robbery of Bangladesh&#8217;s Central Bank was a true 21st-century bank heist. In April, thieves made off with $81 million after hacking into the bank&#8217;s secure messaging system. A shroud of mystery still surrounds the crime, with evidence in the past week suggesting that North Korean hackers may be responsible. The most incredible finding from [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Hazem Bader / Getty" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/6602111/zuckerberg%2520hacked.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The robbery of Bangladesh&rsquo;s Central Bank was a true 21st-century bank heist. In April, thieves made off with $81 million after <a href="http://www.nytimes.com/2016/05/01/business/dealbook/hackers-81-million-sneak-attack-on-world-banking.html">hacking into the bank&rsquo;s secure messaging system</a>. A shroud of mystery still surrounds the crime, with evidence in the past week <a href="http://www.nytimes.com/2016/05/27/business/dealbook/north-korea-linked-to-digital-thefts-from-global-banks.html?smid=tw-nytimesbusiness&amp;smtyp=cur">suggesting that North Korean hackers may be responsible</a>. The most incredible finding from the investigation: The failure may have come down to a simple stolen password.</p>

<p>And now Facebook CEO Mark Zuckerberg has suffered a similar, if less-expensive, fate &mdash; over the weekend, hackers stole his password to <a href="http://venturebeat.com/2016/06/05/mark-zuckerbergs-twitter-and-pinterests-accounts-hacked-linkedin-password-dump-likely-to-blame/">break into his official Twitter and Pinterest accounts</a>.</p>
<p><q class="right">Another 272 million stolen credentials hit the market last week.</q></p>
<p>Nothing captures the crux of our cyber-security crisis like the Bangladesh bank heist. Companies and countries spend millions to build up cyber-security walls, but have no one keeping watch. Meanwhile, thousands of potential keys to the castle are for sale online in the form of <a href="http://fortune.com/2016/05/05/big-data-breaches-found-at-major-email-services/">stolen usernames and passwords</a>.</p>

<p>For years, we&rsquo;ve imagined a boundary between locked-down corporate systems and consumer emails and websites that suffer from frequent vulnerabilities. Now, it&rsquo;s becoming undeniable that the two are unavoidably linked. A hacker&rsquo;s <a href="http://pastebin.com/raw/0SNSvyjJ">detailed chronicle</a> of a successful breach sheds new light on the ways criminals exploit technology to get into nearly any system at will.</p>
<h2 class="wp-block-heading">Stolen keys, not battering rams</h2>
<p>Much of our effort in cyber security has gone toward building high, strong walls. In response, hackers have gotten extremely good at sneaking through the gates. Despite all our progress in building secure software to keep out malicious attacks, hackers repeatedly break into companies&rsquo; networks with stolen keys. The keys are compromised credentials or stolen passwords that end up in the hands of cybercriminals.</p>

<p>Too often, a single password is the only line of defense. The <a href="https://www.swift.com">SWIFT messaging system</a> connects federal banks around the world &mdash; one of the most valuable and sensitive technology bridges in the world. Hacking into the software may be near-impossible, but cybercriminals did not try the near-impossible. Instead they <a href="http://www.reuters.com/article/us-usa-fed-bangladesh-swift-exclusive-idUSKCN0Y001H">signed in with a stolen employee password</a>.</p>
<p><q class="left">Stolen passwords pose extensive security risks because attacks using stolen passwords often do not set off any alarms.</q></p>
<p>Stolen passwords pose extensive security risks because attacks using stolen passwords often do not set off any alarms. The risk is by no means limited to high-value targets like federal bank employees. One in 10 employees <a href="https://www.skyhighnetworks.com/cloud-computing-adoption-trends/">have a stolen corporate password</a> in hacker&rsquo;s hands, representing 92 percent of large companies. In fact, the majority (63 percent) of all confirmed data breaches <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/">involved leaked passwords.</a> A steady pipeline of stolen credentials supply hackers&rsquo; efforts; <a href="http://fortune.com/2016/05/05/big-data-breaches-found-at-major-email-services/">another 272 million</a> stolen credentials hit the market last week. No software or computer system can be secure if it depends on passwords that can be stolen.</p>

<p>We long considered the inferior security of consumer technology a nonfactor for corporate cyber security. However the common link between consumer technology and the corporate world is the employee. When an employee reuses her consumer password for her corporate account, she inadvertently makes her corporate system as weak as her weakest consumer interaction. Research has found that <a href="http://www.infoworld.com/article/2623504/data-security/study-finds-high-rate-of-password-reuse-among-users.html">people &mdash; even Mark Zuckerberg! &mdash; reuse passwords 31 percent of the time</a>. With the proliferation of cloud, personal devices in the workplace, and online business, every company needs to treat online safety as a core part of cyber security, whether it means educating employees about common threats or updating old technology.</p>
<h2 class="wp-block-heading">Barbarians at every door</h2>
<p>Even if one were to set aside the stolen-password problem, our current systems are less like a fortress wall with a single giant gate and more like a maze of hundreds of doors with varying locks and degrees of security developed over time, and whose overall security is as weak as the weakest door and lock. This is a much more accurate diagram of a large corporation&rsquo;s cyber security. In a spy-versus-spy-esque incident, a hacker infiltrated the Italian surveillance company Hacking Team, a squad of information security experts. In a <a href="http://pastebin.com/raw/0SNSvyjJ">detailed report</a>, the hacker divulges the step-by-step process of accessing Hacker Team&rsquo;s secretive technology, hopping from one vulnerability to the next.</p>

<p>In his description, the attacker offers multiple instances where hacking a large company would be much simpler. He points out that a Fortune 500 company&rsquo;s huge network almost guarantees that hackers have an existing point of access from stolen email addresses or vulnerable technology. New research from Verizon highlights companies&rsquo; connections with the internet as the greatest risks, with <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/">40 percent of successful data breaches</a> coming from this vector. In our analogy, you can see that the giant gate we imagine is not much more than a row of turnstiles that invaders can jump over when no one is watching.</p>
<h2 class="wp-block-heading">No one on watch</h2>
<p>Whether there is an impregnable fortress wall or a maze of doors and locks, a vigilant surveillance team should, in theory, catch any intrusion. The absence of effective surveillance gives hackers the upper hand before, during and in the aftermath of a cyber attack.</p>
<p><q class="right">Research has found that people &mdash; even Mark Zuckerberg! &mdash; reuse passwords 31 percent of the time.</q></p>
<p>Companies apply complex statistical analysis to find patterns in business data. The same technology exists for detecting cyber-security threats. These tools do not simply look for large uploads of data or access to blatantly malicious websites; they detect when an employee&rsquo;s behavior differs from the way the employee normally uses work tools. Every large company with sensitive data should have some form of activity monitoring, and it can be seen as a huge failure that the $80 million transfers from the Bangladesh bank&rsquo;s account weren&rsquo;t detected, delayed or blocked, especially given the dubiousness of the destination accounts. Automated monitoring can cover humans&rsquo; shortcomings by analyzing huge amounts of information and never taking time off &mdash; which played a crucial role in the Bangladesh theft.</p>

<p>Perhaps this failure owes to the fallacy of the impermeable system, the impregnable fortress wall. A &#8220;secure&#8221; banking messenger is only as safe as the keys. New revelations show that the Bangladesh bank had only <a href="http://www.reuters.com/article/us-usa-fed-bangladesh-idUSKCN0XI1UO">minimal security around the password</a>, not even separating access to separate systems on the bank&rsquo;s network. There was no multifactor authentication, or &#8220;step-up&#8221; authentication, which requires additional verification for high-value transactions. Given today&rsquo;s IT environments of mazes of interconnected doors and locks, one has to assume that one or more of the doors have been compromised, and so not only do the systems need to be isolated, but the surveillance has to extend to every door, every interconnection and every system, both entry into and also behavior once within.</p>

<p>In the information security industry, we use the phrase &#8220;defense in depth&#8221; to describe the strategy of relying on many layers of security rather than a single line of defense. A combination of prevention, detection and remediation is not necessarily guaranteed to prevent every cyber attack, but it is the best way to avert the type of disastrous breach that puts an organization in the headlines.</p>

<p>As we&rsquo;ve seen from a hacker&rsquo;s own account, there is essentially no foolproof technology or password. However, it is table stakes to ensure that a single password is not the only thing standing between a hacker and hundreds of millions of dollars.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.skyhighnetworks.com/team/rajiv-gupta/"><em>Rajiv Gupta</em></a><em> is a co-founder and the CEO of </em><a href="https://www.skyhighnetworks.com"><em>Skyhigh Networks</em></a><em>. He has more than 20 years of successful enterprise software and security experience, and is widely recognized as a pioneer of web services. Reach him </em><a href="https://twitter.com/trustedmind"><em>@trustedmind</em></a><em>.</em></p>
<hr class="wp-block-separator" /><h2 class="wp-block-heading">Sony got hacked so bad that they started using fax machines</h2><p><iframe width="560" height="315" src="https://www.youtube.com/embed/_hpEujADCyk" frameborder="0"></iframe></p>
<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Rajiv Gupta</name>
			</author>
			
			<title type="html"><![CDATA[How Much Would You Pay to Prevent a Breach?]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2016/2/9/11587694/how-much-would-you-pay-to-prevent-a-breach" />
			<id>https://www.vox.com/2016/2/9/11587694/how-much-would-you-pay-to-prevent-a-breach</id>
			<updated>2019-03-06T05:39:05-05:00</updated>
			<published>2016-02-09T12:58:11-05:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[In a country divided by the upcoming election, President Obama garnered bipartisan support for a significant budget increase this week: $5 billion in additional cyber security spending. The one-third increase &#8212; to $19 billion in 2017 &#8212; marks an initiative from our country&#8217;s highest office to crack down on cyber threats &#8212; which are, in [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="iQoncept/Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15798832/ransomware_iqoncept.0.1492370803.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>In a country divided by the upcoming election, President Obama garnered bipartisan support for a significant budget increase this week: <a href="http://www.theverge.com/2016/2/9/10950298/white-house-federal-cybersecurity-budget-barack-obama">$5 billion in additional cyber security spending</a>. The one-third increase &mdash; to $19 billion in 2017 &mdash; marks an initiative from our country&rsquo;s highest office to crack down on cyber threats &mdash; which are, in Obama&rsquo;s words, &ldquo;among the most urgent dangers to America&rsquo;s economic and national security.&rdquo; A similar attitude prevails on the global stage: The World Economic Forum <a href="http://www.scmagazineuk.com/cyber-attack-among-world-economic-forums-top-global-risks/article/465405/">named cyber attacks one of the greatest threats to business</a>, above terrorist attacks and interstate conflict.</p>

<p>The escalated attention to cyber defense couldn&rsquo;t come sooner, as government organizations and businesses struggle to prevent some of the most dangerous types of attacks.</p>
<blockquote class="red right"><p>In the 21st century, hackers are the bank robbers and data is the hostage.</p></blockquote>
<p>Imagine thieves stealing your company&rsquo;s computers, demanding money for their return and putting them through a trash compactor if you decline. This nightmare is frighteningly close to the reality of cyber ransom. Victims rarely have any alternative besides giving in to hackers&rsquo; demands. Unfortunately, cyber ransom is one of the more prevalent and lucrative forms of criminal hacking to threaten companies today.</p>

<p>In the increasingly monetized world of hacking, no target is safe from criminals holding important files hostage for ransom. One variation of this service, &ldquo;ransomware,&rdquo; functions as a malware that encrypts files on a computer, preventing the owner from accessing them to extort payment. Security professionals have not cracked the code on preventing ransomware attacks: Experts detected <a href="http://www.securitymagazine.com/articles/86787-ransomware-attacks-to-grow-in-2016">four million samples in the second half of 2015</a>, up from 1.5 million two years ago.</p>

<p>The size and scale of the attacks reflect a new audacity on the part of perpetrators. In the past year, hackers have carried out ransom attacks on a <a href="http://www.nytimes.com/2015/10/24/technology/hackers-demand-ransom-from-talktalk-british-telecom-firm.html?_r=0">British telecom provider</a>, <a href="http://www.dw.com/en/greece-says-hackers-hit-banks-with-bitcoin-ransom-demand/a-18885881">Greek banks</a>, and a <a href="http://business-reporter.co.uk/2015/12/07/hacker-holds-united-arab-emirates-bank-to-3-million-ransom/">United Arab Emirates bank</a>. In this last case, the bank refused to negotiate, and the hacker publicly posted the sensitive information of nearly one million customers in response. In the 21st century, hackers are the bank robbers and data is the hostage.</p>
<h3 class="red">To negotiate with hackers?</h3>
<p>Contrary to the philosophy of not negotiating with terrorists for fear of incentivizing future incidents, the FBI has actually <a href="http://www.wsj.com/articles/paying-ransoms-to-hackers-stirs-debate-1447106376">recommended that victims pay ransoms</a> in certain scenarios. While critics claim this strategy only validates the method as a financially viable solution for hackers, victims and law enforcement alike are essentially helpless. The economic argument for dissuading future ransoms doesn&rsquo;t compel companies faced with losing access to critical information.</p>
<blockquote class="red right"><p>Realizing that their organization&rsquo;s reputation would be on the line, 24.6 percent of IT departments reported that they would pay a ransom to prevent a data breach.</p></blockquote>
<p>What do the security professionals on the front lines think? The grim stories of past victims certainly inform the reactions of security professionals when asked whether they would pay a ransom. Realizing that their organization&rsquo;s reputation would be on the line, <a href="https://www.skyhighnetworks.com/csa-report/">24.6 percent of IT departments</a> reported that they would pay a ransom to prevent a data breach. We&rsquo;re not talking about trivial sums, either: 14 percent would pay more than one million dollars. This amount isn&rsquo;t surprising when you consider the enormous financial damage a company suffers in the wake of a breach. Costs soar beyond tangible expenses from damage to a brand&rsquo;s reputation. The <a href="http://www.reuters.com/article/us-cybersecurity-ibm-idUSKBN0OC0ZE20150527">average cost of a breach rose to $3.8 million</a> in 2015, not to mention potentially the jobs of the security staff involved.</p>
<h3 class="red">Rising price tags drive accountability for breaches</h3>
<p>Are we at such a desperate state of cyber security where we&rsquo;re just waiting to pay ransom for the next breach? Consumers have grown weary &mdash; 63 percent expect their data to be compromised in the next 12 months. It&rsquo;s difficult not to ask the question, &ldquo;Is something wrong with the way we protect information?&rdquo;</p>
<blockquote class="red right"><p>It&rsquo;s more expensive to be hacked than ever before &mdash; the average cost of a breach rose to $3.8 million in 2015.</p></blockquote>
<p>While <a href="http://www.eweek.com/security/cyber-security-is-a-top-priority-in-corporate-boardrooms.html">consensus places responsibility for cyber security with the CEO and board of directors</a>, there is a huge gap between words and action. A global study of 109 banks found that <a href="http://www.americanbanker.com/news/bank-technology/get-tech-expertise-in-your-banks-boardroom-1078542-1.html">only 6 percent of board members have technology experience</a>, and 40 percent of the banks do not have any board members with a technical background. Lack of oversight at the top is a recipe for disaster, resulting in failure to properly enforce corporate governance. Companies may put off upgrading cyber defenses because of the cost, only to find that they underestimated the financial impact of a data breach.</p>

<p>Cyber security is embedded in a web of financial incentives, but the increasing costs of failure, i.e., suffering a data breach, indicate that companies will be held increasingly accountable for protecting data. For example, whether or not a company has cyber insurance in place factors into the decision to pay ransom. Companies with cyber insurance are more willing to pay up. <a href="http://www.reuters.com/article/us-cybersecurity-insurance-insight-idUSKCN0S609M20151012">Cyber insurance costs are rising</a>, however, with certain companies even evaluated as uninsurable. In the same trend, the European Union introduced new regulations on protecting customer data &mdash; with more teeth than ever before. The maximum fine increased to &euro;100 million or 5 percent of global revenue, whichever is higher. Combined with the increased average cost of a breach, it looks like it&rsquo;s more expensive to be hacked than ever before.</p>
<h3 class="red">Outgunned and outmatched?</h3>
<p>Simply throwing more money at security does not appear to be the solution, however, as last year marked an increase in security budgets and breaches. Criminal hacking has transformed from solo hackers into a true industry with organized syndicates. These groups have the advantage of innovative, state-of-the-art tools. Are companies doomed to fall behind hackers in a cyber arms race?</p>

<p>An entire collaborative ecosystem has developed to support the hacking economy. There are sleek applications to automate stolen credit card credentials, and researchers even uncovered a <a href="https://threatpost.com/new-javascript-ransomware-sold-as-a-service/115755/">ransomware-as-a-service</a> (RaaS?) offering. Hackers regularly leverage free consumer cloud services in attacks against companies with security budgets in the millions of dollars.</p>
<blockquote class="red right"><p> An entire collaborative ecosystem has developed to support the hacking economy.</p></blockquote>
<p>A paradigm shift favoring the good guys may lie in a parallel climate of innovation on the enterprise side: The consumerization of IT. The federal Office of Personnel Management, after suffering a blockbuster data breach, bemoaned the weak security capabilities of the outdated technology in place. Cloud services are disrupting legacy tech vendors, and not just because the applications are easier to use for employees. A majority of companies &mdash; 64.9 percent &mdash; now consider cloud services as equally or more secure than traditional legacy software. Many cloud service providers are innovative, venture-backed startups employing some of the best talent in the world. Security is their bread and butter, since their entire business model depends on not getting hacked. Leveraging the latest and greatest cloud applications gives companies the firepower to keep up with hackers.</p>

<p>An industry analogy compares cyber security to running away from a bear in the forest: You don&rsquo;t need to be faster than the bear; you just can&rsquo;t be the slowest person running away. The use of emerging technologies for IT and security is now a <a href="http://www.medicalpracticeinsider.com/news/upsides-betting-early-stage-it-startups">competitive differentiator</a>. To bring light to the end of the cyber security tunnel, companies need to open the door to new technologies.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.skyhighnetworks.com/team/rajiv-gupta/"><em>Rajiv Gupta</em></a><em> is a co-founder and CEO of </em><a href="https://www.skyhighnetworks.com"><em>Skyhigh Networks</em></a><em>, a cloud security and enablement company. He has more than 20 years of successful enterprise software and security experience, and is widely recognized as a pioneer of Web services. Reach him </em><a href="https://twitter.com/trustedmind?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor"><em>@trustedmind</em></a>.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Rajiv Gupta</name>
			</author>
			
			<title type="html"><![CDATA[When Sharing Is Erring: Don&#8217;t Be the Reason Your Company Is Breached]]></title>
			<link rel="alternate" type="text/html" href="https://www.vox.com/2015/10/28/11620124/when-sharing-is-erring-dont-be-the-reason-your-company-is-breached" />
			<id>https://www.vox.com/2015/10/28/11620124/when-sharing-is-erring-dont-be-the-reason-your-company-is-breached</id>
			<updated>2019-03-06T06:04:45-05:00</updated>
			<published>2015-10-28T11:46:41-04:00</published>
			<category scheme="https://www.vox.com" term="Technology" />
							<summary type="html"><![CDATA[Anyone in the U.S. who has seen a health care provider in the last two decades is familiar with the data privacy requirements of the Health Insurance Portability and Accountability Act, better known as HIPAA. Every patient is asked to read a privacy statement and sign a form to acknowledge understanding that statement. Health care [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Unuchko Veronika/Shutterstock" data-has-syndication-rights="1" src="https://platform.vox.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/15805590/blame_unuchko-veronika.0.1492370803.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Anyone in the U.S. who has seen a health care provider in the last two decades is familiar with the data privacy requirements of the <a href="http://www.hhs.gov/ocr/privacy/">Health Insurance Portability and Accountability Act</a>, better known as HIPAA. Every patient is asked to read a privacy statement and sign a form to acknowledge understanding that statement.</p>

<p>Health care workers are schooled on the intricacies of the law, so it&rsquo;s a bit of a surprise that workforce members of St. Elizabeth&rsquo;s Medical Center (SEMC), a hospital in Brighton, Mass., used an Internet-based file sharing service to store documents that contained electronic health records of 498 individuals without first assessing the risks associated with the use of the service. As the result of the <a href="http://www.beckershospitalreview.com/healthcare-information-technology/st-elizabeth-s-to-settle-hipaa-violation-for-218-000.html">HIPAA violation</a>, SEMC agreed to pay $218,400 to the U.S. Department of Health &amp; Human Services&rsquo; Office for Civil Rights (OCR), and SEMC must comply with the terms of a Corrective Action Plan (CAP).</p>

<p>Software applications delivered via the Internet, commonly known as cloud computing, are transforming how businesses operate. Studies from Vanson Bourne have shown that businesses taking advantage of productivity-enhancing cloud services grow 19.6 percent faster than their counterparts that don&rsquo;t. That kind of growth is luring more companies to the cloud.</p>

<p>The ready availability of more than 16,000 cloud applications empowers individual workers, work groups and entire business departments to engage directly with service providers to set up the applications they need in hours, or even minutes. While the rapid road to productivity that cloud computing offers is a positive development, it also opens up areas of risk, especially when applications are deployed without the support or knowledge of the IT department. This is a costly lesson that was learned firsthand by the staffers of St. Elizabeth&rsquo;s Medical Center.</p>

<p>Skyhigh Networks&rsquo; analysis of <a href="https://www.skyhighnetworks.com/cloud-computing-adoption-trends/">actual usage</a> shows that the average organization now uses 1,154 cloud services &mdash; a number that has more than doubled in just two years. New cloud services are launched every week, offering innovative features and capabilities that entice workers to try them. On the plus side, organizations have never had more cloud apps to choose from that provide robust levels of security for enterprise data. Nevertheless, workers opt to use less secure consumer-grade cloud services for business purposes 27 percent of the time.</p>

<p>In recent years, the role of the IT department has shifted away from being an organization&rsquo;s sole source of all computing resources and information services to being more of a consultative partner to help business departments evaluate and select appropriate cloud-based services. A primary concern is the security of corporate data going into various cloud apps. Business departments and their IT counterparts have a shared responsibility to ensure that data is protected with measures that meet or exceed corporate policies.</p>
<h3 class="red">Risky behavior: When sharing is erring</h3>
<p>Among the most frequently used types of cloud applications are collaboration and file-sharing services. Many originated as a means to synchronize files across devices, but now they commonly offer the ability to share files with colleagues and business partners and to allow users to edit the same file in real time. The average company uploads 5.6 terabytes of data to file sharing services every month. To put that in perspective, 5.6 terabytes is roughly 480 million pages of Microsoft Word documents. Every month.</p>

<p>It&rsquo;s not so much the volume of shared data that&rsquo;s a concern, but the nature of the data and how it&rsquo;s protected. Around 15 percent of all documents uploaded to cloud-based file sharing services contain sensitive information such as confidential company data, personally identifiable information, payment data or protected health information. These classifications of data need strong security measures to protect against theft, corruption or loss.</p>

<p>Some, but not all, cloud services inherently provide enterprise-grade data protection features, including encryption, tokenization and data-loss prevention. It&rsquo;s the responsibility of the party engaging with these services to ensure that the data security measures are completely in line with corporate standards. For example, a cloud service might provide data encryption, but the encryption keys are held by the service provider. This is inadequate as a corporate security measure, in that whoever has access to the keys can also have access to data in the clear; in this case, it&rsquo;s the service provider. Most enterprises have policies that prohibit this scenario.</p>

<p>Another concern about the use of file-sharing and collaboration services is who the files are shared with. Skyhigh Networks has observed that 28 percent of documents that are shared via a service are provided to external business partners. Of the shared files, 5 percent are accessible by anyone with access to the appropriate link. These links are easily forwarded and can create risk, since the organization cannot audit or control who is accessing the document. Of further concern, 2.7 percent of these files are actually publicly accessible and indexed by Google. Imagine confidential business development plans, meant exclusively for the use of a business partner, being readily available to anyone using Google&rsquo;s search engine.</p>
<h3 class="red">When attackers act like insiders: Compromised accounts</h3>
<p>Data thieves are taking notice as organizations put more and more sensitive information into cloud applications. Compromised credentials for SaaS applications can make it easy for an external actor to gain access to these critical business applications and, for all intents and purposes, appear to be the legitimate user. How are account credentials compromised? Largely through phishing attacks and database hacks. Skyhigh research has shown that 92 percent of companies have cloud credentials for sale on the Darknet. Three out of four organizations have at least one compromised account each month.</p>

<p>A highly popular cloud storage service had a breach in 2012 in which users&rsquo; accounts were easily accessed. The attackers used account information and passwords that were stolen from other websites to gain access to the storage accounts. The damage could have been lessened if users hadn&rsquo;t reused their credentials from other websites, but it also shows that multifactor authentication (MFA) could have been a good deterrent in the attack. MFA requires a second form of authentication, such as entering a code that is sent out-of-band via text message, email or phone. Using MFA is a best practice for all applications, but certainly for cloud applications that sit outside a corporate firewall.</p>
<h3 class="red">Shared responsibilities</h3>
<p>IT departments don&rsquo;t want to stand in the way of business workers&rsquo; productivity. If cloud-based applications are needed to support business processes, that&rsquo;s fine, but engaging those services should be a shared effort between the lines of business and IT. The business departments own the data going into the cloud, but IT personnel have a duty to help secure it. IT can help workers and departments assess and select enterprise-ready cloud apps and verify that adequate controls are in place to help assure data security, governance and compliance. Less data security should never be a trade-off for the convenience of using cloud-based applications.</p>

<p>No organization wants to be the next data-breach news headline, and all employees have a responsibility to protect their company&rsquo;s data assets, regardless of where they are.</p>
<hr class="wp-block-separator" />
<p><a href="https://www.skyhighnetworks.com/team/rajiv-gupta/"><em>Rajiv Gupta</em></a><em> is a co-founder and CEO of </em><a href="https://www.skyhighnetworks.com"><em>Skyhigh Networks</em></a><em>, a cloud security and enablement company. He has more than 20 years of successful enterprise software and security experience, and is widely recognized as a pioneer of Web services. Reach him </em><a href="https://twitter.com/trustedmind?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor"><em>@trustedmind</em></a>.</p>

<p><small><em>This article originally appeared on Recode.net.</em></small></p>
						]]>
									</content>
			
					</entry>
	</feed>
