Cloud computing is one of the leading trends in the modern world of information technologies. Due to the upcoming security issues, many companies choose not to go cloud. Trend Micro offers to consider identification as an important element to provide security in the cloud.
Many identification patterns use usual combination of a user name and password. Problems associated with them are well-known, but their importance grows when going cloud.
The main advantage of cloud computing is access to cloud services from any part of the world. However, new risks are arising. Users may be attracted by insecure access points, for example, free Wi-Fi networks. However, such applications as SmartHide help you protect personal information in free WI-Fi networks and provide other functions.
Hackers also realize the importance of user identification data and develop methods of their theft. Top 2 viruses oriented at remote banking servicing includes Trojans ZeuS and SpyEye.
Both of them have wide technical capabilities for phishing (theft of personal identification data).
1) Any web-site can become a target, including those providing services in the cloud;
2) Secondly, even entry pages of the SSL-protected systems are not quite secure.
Security of the cloud is a complex task that has several aspects. Anything – devices, users or access points, should be protected. Only if all the three objects are secure, an IT-administrator will be able to answer our question: “Yes, we are ready for the cloud”.