Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

The Cloud Gets Hacked but Who’s Really to Blame?

byadmin
September 9, 2014
in Trends

The hack of celebrity nude selfies raises some interesting questions most notably, who is responsible for that last 10% of effort that is required to fully secure someone’s data?

It seems that the hack of the files was a combination of phishing, and exploitation of vulnerabilities in Apple’s photo backup. Weak passwords and user gullibility played a part in the compromised data making its way onto 4chan, but don’t we always blame the user for weak passwords or for not having taken sufficient care to protect themselves?

Comedian Ricky Gervais was castigated on Twitter for daring to joke about not putting your naked selfies onto cloud storage. Granted, hacking into personal accounts seems like a violation of the person that goes beyond the materials exposed, and we should sympathise with the users but should we expect more of users when it comes to security online?

First of all, since when are users supposed to be expert at this stuff? Why do we expect them to sign up for all of our services and apps and then tell them to be better at password usage and self-protection?

We want them to expose more of themselves and then we kind of get irate when they don’t have great passwords or aren’t better at figuring out how everything should be secured online.

This is a fundamental user experience issue and the answer is that the people who build software are going to have to get a lot better at figuring out security and that they are going to have get even better at figuring out how to make users better at security.

We cannot expect users to be cyber savants or password freaks or to devote a significant portion of their time to self-preservation. It’s just not how we work, by the way. We expect quick conversions and the shortest path to an online account. That leaves very little room for engagement on security education.

It shouldn’t be a problem to say to users that your data is never secure, truly secure, either. Perhaps online applications over promise and under deliver on what they can do to protect the user.

What is obvious is that we are trying to corral as many people as possible into our services and we want more of their information and personal data. It’s the lifeblood of online success. We expect our users to give us more and to trust us.

Frankly, it is untenable because that’s an awful lot of users and an awful lot of data and too many lines of code to verify and secure.

Our desire for overwhelming services that connect hundreds of millions of people are going to create massive points of failure. That seems logical.

You get a stress fracture in a car that results in an accident, it has a different impact than one in an airplane or cruise ship. That’s why, despite the statistics, a failure that results in a plane crash is overwhelming compared to one that results in an automobile accident. We fear flying but not getting into a car even though we are more likely to be in a car accident.

Online, we have a stress fracture that can bring down a huge number of people. The hack of Target customer accounts impacted 140 million people.

Ironically, we tend to forgive online catastrophes because, well, because they are so virtual. They seem to be ethereal problems. There are real consequences but mostly we chalk it up to inconvenience. Change your password, set up a new account, and things of that nature.

However, that is delaying an inevitable situation where the consequences may be really painful. We are giving up more of our own decision making processes to applications. These applications are not fully tested to deal with every situation and possible fault scenario.

The reason why Microsoft Windows has the Blue Screen of Death (BSOD) is not because Microsoft isn’t good at building an OS. It is because there are millions of lines of code and an infinite number of permutations of usage that cannot be fully tested and accounted for.

You get a BSOD on your laptop, and you reboot. I wonder what the BSOD of the Internet will look like. It certainly won’t look like a nude celebrity selfie.

Users are not responsible for what happens next. They cannot be expected to act as a frontline defense online. It is unreasonable, and unworkable.

Follow @DataconomyMedia


The Cloud Gets Hacked but Who's Really to Blame?Omid Rahmat has more than 20 years experience in senior management at high tech companies having heald executive positions in both Europe and North America. His company, Burnside Digital, is a leader in Agile development services and training programs. He currently resides in Southern California with his family where he publishes BreakingMuscle.com and TGDaily.com as well as develop software applications for digital media companies.


 

(Image Credit: Adam Fagen)

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

Related Posts

accessiBe review: How the company helps businesses build more accessible digital experiences

accessiBe review: How the company helps businesses build more accessible digital experiences

July 14, 2025
The creator economy is dead. Welcome to the learner economy

The creator economy is dead. Welcome to the learner economy

July 3, 2025
How a crypto wallet keeps digital coins safe: All you need to know

How a crypto wallet keeps digital coins safe: All you need to know

July 3, 2025
Implementing identity first security for stronger access control

Implementing identity first security for stronger access control

April 15, 2025
Switch 2 vs Switch Lite: Is the upgrade worth it?

Switch 2 vs Switch Lite: Is the upgrade worth it?

April 9, 2025
What is airport theory: A TikTok trend that pushes travel limits

What is airport theory: A TikTok trend that pushes travel limits

March 18, 2025
Please login to join discussion

LATEST NEWS

Waterfall 2.0: AI brings back structured software development

Chinese hackers use Claude to run large scale cyberespionage

Google expands Pixel call recording to global users

Facebook levels up Marketplace with social features and AI support

NotebookLM gains automated research and wider file support

Tesla is reportedly testing Apple CarPlay integration

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.