Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 23 July 2009

Twitter hack caused by lack of security

Posted on 11:43 by Unknown
Basingstoke, July 2009 (Eskenzi PR) - News that Twitter has been hacked yet again comes as no surprise, given the fact that many IT staff are and managers are being pushed into adopting cloud computing services on a fasttrack basis, says Origin Storage, the storage systems integration specialist.

"Our observations suggest that a number of companies and their staff are being forced down the cloud computing route and are having to adapt their IT security systems on the fly." said Andy Cordial, Origin Storage's managing director.

"We have had concerns about this rate of change in the business sector for some time and, with all the data breaches occurring on the cloud front, it's obvious that the chickens are now coming home to roost," he added.

According to Cordial, this latest Twitter hack appears to be the result of the password of a company co-founder being guessable on the GoogleApps service which then allowed the hacker access to his personal information including details of his wife’s computer.

It is, he explained, a common problem in IT departments, but one that can be solved by applying a sizeable slice of common sense and adding a selection of encryption technologies plus policies to the mix.

Adding encryption to a company's data storage - whether in the cloud or not - he said, will ensure that data at rest, as well as on the move, is protected from prying eyes.

And if a secure password best practice is applied on top of corporate encryption policies, the resultant multiple layers of defence can help prevent human error causing a faux pas like the latest Twitter hack.

"Applying effective security is all about planning and then applying that planning, backed up by a set of solid security policies with encryption at its heart," he said.
"If Twitter had had this strategy operating at all levels of its hierarchy, rather than apparently going for user growth at any cost, it wouldn't be in the embarrassing situation it is now," he added.

For more on the latest Twitter security lapse: http://preview.tinyurl.com/nyw728

For more on Origin Storage: http://www.originstorage.com

Mark Fullbrook, UK and Ireland Country Manager for Cyber-Ark said: “I find it amazing that a company such as Twitter still holds company sensitive information such as HR records on servers that can be accessed with a simple username and password, without any ability to audit who has access.

The fact that this has come from the use of an administrators account, further underlines our advice to utilise a digital vaulting solution to store and manage highly sensitive info whether that be a file or a privileged password.”

Amichai Shulman CTO of Imperva went on record saying: “This is a great lesson in cloud security. My guess is that once the hackers got hold of the email account they used the “recover password” feature of Google Apps to compromise the Google Apps account for that individual. Not that this could not have happened to a corporate account but… in order to compromise a corporate account you’d usually go through two authentication mechanisms (VPN and then internal network login). Plus, if you had a good data loss protection solution in place, you would prevent your business sensitive documents from leaking. With a cloud service there is no one to “double check” the extraction of documents and other sensitive information.”

Calum Macleod Regional Manager of Tufin Technologies said on this issue: “This highlights one of the many security and compliance issues that cloud computing raises. Although issues such as strong authentication and securing sensitive data are clearly issues in the cloud computing scenario, fundamentally one of the areas that organizations are not addressing and in many cases not even aware of is how lax their firewall configurations are. Allowing internal users to pass through corporate firewalls and access uncontrolled services on the Internet due to a failure to properly police their firewall policies will continue to result in information leakage. Obviously these employees were allowed to access the information but surely the corporate firewall policies should ensure that only essential traffic is allowed pass through. If nothing else this should serve as a warning to any Security officer to manage their firewall policies more effectively and provide their administrators the essential tools to control who has access to what!”

<>
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ▼  July (35)
      • What links Twitter, stolen bikes and the Boston Po...
      • Ironkey Announces over 1,000 Enterprises have Adop...
      • Website login with Biometric Identity Card
      • Twitter email account hack multi-vectored and but ...
      • ISACA Leader Calls for Fundamental Changes to Info...
      • Don't always jump on the SSD bandwagon
      • Experts predict more mobile trojan slip-ups on the...
      • Split Stick, Double-Sided USB Drive, Hits quirky's...
      • Charmaga brothers card fraud case highlights need ...
      • Twitter hack caused by lack of security
      • New Oracle security flaws facilitate data leaks ac...
      • Head Office of Powerpets, Inc. has switched to Ubu...
      • McAfee partners with Tufin to automate network sec...
      • Microsoft's Gazelle Web browser project a positive?
      • Organisations unprepared for iPhone security threa...
      • Denial of Service attacks could have been engineer...
      • IronKey first USB storage device to achieve FIPS 1...
      • Napatech zero packet loss technology boosts data t...
      • ASUS Eee PCs and Linux
      • Information Commisioner's Office action against in...
      • Finjan Blocks New Zero-Day Attack on Microsoft Vid...
      • Britney Spears hack highlights reputational risk o...
      • SecureFlash by Insight Promotions – Product Review
      • Tufin delivers first-to-market functionality with ...
      • Tufin Technologies Delivers on the vision of Secur...
      • Google's Anti-Malvertising.com Site Launch Welcome...
      • Six pound broadband tax planned for UK telephone u...
      • Even IT Professionals can’t be bothered with Passw...
      • ISACA applauds plan to boost Information Commissio...
      • Responding to Cyber Criminals Finjan release Secur...
      • Digital Britain plan leaves Infosecurity Adviser b...
      • Open Source Software in Business & Government
      • Experts say Irish Gas Board data loss highlights n...
      • Women's British Bobsleigh team zooms along with Or...
      • Experts say Parcelforce data leaks caused by code ...
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile