Tips

What’s done to protect access to my information in the “cloud”?

Most cloud computing applications rely on usernames and passwords to protect access to your information, just like most services you use on the Internet. Unfortunately, passwords provide a low level of security because they can be stolen by malware, malicious software programs like keystroke loggers that capture your login credentials as you type them and send them to hackers who can then access your information. If you want more security for protecting your information in the cloud, look for cloud computing providers that offer a digital security device you can use when you login, known as two-factor authentication. Examples includes one-time password (OTP) tokens to create a unique password every time you login, or smart card credentials or USB tokens that use cryptography and highly secure key exchanges to prove it is you. Including a device in the login process is far more secure than just a password, because it means a stolen password by itself cannot be used to access your information in the cloud. A good example is Gemalto's OTP for Amazon Web Services, a two factor authentication solution. Amazon is a leading provider of cloud computing and Gemalto is a leading provider of digital security solutions.

See also:

How can I protect my digital identity on the Internet?

How do I prevent spyware and malware?

What is two factor authentication?

Rate this tip: 
Views: 
4228
Rate: 
5
  • My comment
  • Comments [0]

Add new comment

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
Image CAPTCHA
Enter the characters shown in the image.

No comments available



If you do not findthe answer you're looking for...

Ask your question