Cloud security

With the possibilities of a new technology comes a responsibility to secure it.

The confidential information of the Internet goliaths has been exposed once again. This time, Twitter.com has fallen victim. Hundreds of corporate e-mails, financial projections, private meeting notes and other sensitive data became available to a hacker, who then sent his ill-gotten gains to TechCrunch.com âÄî which published most of the information. Web sites that handle millions of users daily should learn from this privacy snafu. In reality, there is no such thing as Internet security. Other big names such as Yahoo and Google have fallen victim to the false word âÄúsecurity.âÄù These companies have become incapable of securing sensitive data. But is it the technology industryâÄôs fault? Or should we fault the broken model of security in the concept of password protection? In the Twitter case, the hacker gained access simply by cracking an employeeâÄôs password stored offsite on a GoogleDocs document. GoogleDocs is part of a new revolution in the computing world, dubbed cloud computing. Cloud computing programs are like traditional applications but they store data on an outside server, making it available anytime. Strong passwords are a necessity with cloud computing applications such as GoogleDocs and Gmail because they are all linked to a central account. If that account has a weak password, the information within it is highly vulnerable. Web security is a two-way street. Hackers have begun to target Web sites with weak security, find passwords, and then use them on the more secure sites. While education to the average end-user is important, companies have equal responsibility in todayâÄôs new cloud-computing environment.