(3) Tumbling hacks The recent publication of LinkedIn’s breached database of usernames and passwords has set off a swathe of tumbling hacks. Tumbling hacks rely on the fact that most people reuse passwords – depending on who you ask between a half and a two-thirds of people will reuse a password across multiple cloud apps. Once a criminal knows a username and password for one site, they can try their luck on all the other common sites. The recent LinkedIn breach has seen follow on attacks to Twitter, GitHub, and GoToMyPC. (4) Cloud backups Cloud storage is a fantastic way to access data across multiple devices, as well as a quick and easy backup system. But the answer to “What’s the worst that could happen?” is someone accidentally deleting the folders on the website, and this deletion syncing to every device. Aside from accidental deletions, having all the data in one central place means that if your cloud storage account gets hacked, criminals can copy the data, delete the central source, and then hold your data to ransom.
Read more on enterprise apps:
- A year with the Apple Watch: The best and worst points from the eyes of a business executive
- Seven time-saving apps your fellow entrepreneurs use to boost productivity
- Ten offbeat business apps to support entrepreneurial pursuits
Share this story