Recent cloud critics, including Wozniak, intensify debate

By Brandon Butler, Network World |  Cloud Computing, cloud security, Steve Wozniak

It comes down to using common security sense, and providers eliminating human and process errors that allow hackers to exploit users. Reports this week indicate that Amazon and Apple have amended their security practices, particularly related to password security in customer service calls.

If a hacker can call into Amazon and get a password reset by answering questions that could be found out about a person on the interview or through a five-minute conversation with them at a bar, there is something wrong with the system in general, Shimel says. "We need to move beyond passwords," he says. One step, on the personal cloud computing end, is to use two-factor authentication, as Shimel argues in a recent blog post, which ultimately is a protection end users put in place themselves, not relying on their providers to do it for them.

Network World staff writer Brandon Butler covers cloud computing and social collaboration. He can be reached at BButler@nww.com and found on Twitter at @BButlerNWW.


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Cloud ComputingWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question