Cloud computing has been one of the most significant advances of the ongoing Information Age, and it is bound to keep growing in the next few decades. The widespread adoption of the cloud computing paradigm has resulted in the emergence of personal clouds, a data practice that corporate spies are too willing to exploit.
The Shortcomings of “Bring Your Own Cloud” Solutions
Business owners are even more likely to turn to the cloud for various reasons, but they have to be careful about managers and employees who use personal clouds. This practice is known as Bring Your Own Cloud (BYOC), and it is potentially fraught with danger.
It is easy to see how BYOC can get out of hand. Let’s say a law firm is serving VIP clients in the High Desert region contracts Sonic Systems to install a secure corporate server. Under a loose BYOC policy, that law firm could compromise its confidential files by allowing a new attorney to keep documents on her personal Dropbox account.
When it comes to corporate espionage, perpetrators tend to be familiar with their targets, or they may use social engineering and public records research to guess passwords. In our example of a High Desert law firm that allows a new hire to use her Dropbox account, a bad guy who knows about the life of the attorney may deploy a phishing attack to steal her password or an IP spoofing attack to attempt multiple logins with guessed passwords.