Home Library Translate
A A A
Share »
Follow us on Facebook Follow us on Twitter Follow us on LinkedIn
Connect »

Blog: Crisis Management

Menu

  • This Blog's Home
  • Guest Writer Submissions
  • Policies
  • To Subscribe to a Blog
  • About
  • Feedback

Cloud Computing Creates Computer Crises

By Jonathan & Erik Bernstein on August 6, 2012

Technology outpaces security

Let’s assume (against the odds) that you’ve been thorough about online password security. You don’t use common garbage passwords like 1234, qwerty, or your birthday, you make sure not to share the same passes between accounts, and your security questions have answers that aren’t in the public domain. That means that your web accounts, which hold everything from irreplaceable family pictures to highly classified corporate documents, are safe, doesn’t it?

Not even close. For those who are unfamiliar with how computer hacking works, a surprising amount does not involve any actual computer work, but rather social engineering – the art of manipulating people into performing actions or divulging confidential information. For example, check out this quote from a Wired article by Mat Honan that details how a pair of hackers took control of his Amazon account, several Apple devices, and email/social media accounts using just his email, billing address, and the last four digits of his credit card, by exploiting an overlap of information between Apple and Amazon’s tech support systems.

Apple tech support gave the hackers access to my iCloud account. Amazon tech support gave them the ability to see a piece of information — a partial credit card number — that Apple used to release information. In short, the very four digits that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers secure enough to perform identity verification. The disconnect exposes flaws in data management policies endemic to the entire technology industry, and points to a looming nightmare as we enter the era of cloud computing and connected devices.

These days everything is going on the cloud. Problem is, the very same technology that makes it simple for us to work and play from any device, anywhere, also creates massive new crisis management risks. Currently, cloud computing and the sheer level of interconnectedness pushed by major social media sites and online retailers has simply outpaced web security and the reality is that if a hacker wants your information and has a decent level of skill, or even just a silver tongue, it’s probably theirs.

Everyone should assume that they will be hacked at some point, and formulate a plan to make it have as little impact as possible. Constantly back up ANYTHING that you’d be upset to lose. If you’ve got confidendential information, store and back up to a computer that’s not shared on your cloud network. If you absolutely must have it easily accessible, use an encryption tool (several good ones are actually available free) to enhance security.

At the same time, businesses like Apple and Amazon need to work together to eliminate security flaws like that one that exposed Mat Honan’s life to the whims of two teenage hackers out to get some e-fame. Regardless of the fact that they are separate entities, allowing information from one to unlock access to the other is a HUGE issue that greatly undermines consumer faith. If you think you’ve finally got your systems secure, try bringing in a “white hat” hacker. These are security experts, many of whom dabbled in the dark side during their younger days, who specialize in getting into your system, then telling you how they did it.

After hearing how Mat was hacked, Wired staffers set about to repeat the process, and following a few phone calls were able to take complete control of another linked set of Apple and Amazon accounts. Frightening, and real. Be prepared.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training, and co-host of The Crisis Show. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

« Previous Next »

Search Our Site

Meet this Blog’s Co-Hosts

Jonathan L. Bernstein, founder and Chairman of Bernstein Crisis Management, Inc. has more than 25 years of experience in all aspects of crisis management – crisis response, vulnerability assessment, planning, training and simulations.[Read more ...]


Erik Bernstein is president of Bernstein Crisis Management. Erik started with BCM in 2009 as a writer and subsequently became social media manager for the consultancy itself as well as for a number of BCM clients before moving to the president position. [Read more ...]

Recent Blog Posts

  • Edgy Marketing – Balancing Speed and Reputation In The Digital Space
  • Digital and Online Now Main Source Of News
  • Are You Prepared For 2021? New Crisis Management Survey Out Now
  • Crisis Preparedness and Response Is About To Get Tougher
  • How to Create a Crisis Management Plan to Respond to a Cyber Breach
  • Audi’s ‘Insensitive Ad’, or Why you always ask how else an image could be interpreted.
  • The Road To Crisis Recovery
  • Preparing DURING The Pandemic
  • Coronavirus: What You CAN Control
  • Southwest’s COVID-19 Crisis Communications And What You Need To Be Doing

Categories of Posts

  • Avoid the Apology
  • college crises
  • communications
  • conflict resolution
  • Crisis Assessment
  • Crisis Avoidance
  • crisis communications
  • crisis management
  • Crisis Management Quotables
  • crisis planning
  • crisis preparedness
  • Crisis Prevention
  • crisis public relations
  • Crisis Response
  • crisis training
  • customer service
  • cyber attacks
  • cyber bullying
  • cybersecurity
  • data breach
  • Dealing With Media
  • Digital Media Law Project
  • disaster crisis management
  • disaster prevention
  • Disaster Response
  • disease crisis management
  • emergency management
  • Erik Bernstein
  • ethics
  • Facebook
  • food industry crisis management
  • hackers
  • hacking
  • Higher Education
  • hospitality
  • HR
  • information security
  • Internal Communications
  • internet crisis management
  • internet security
  • Jonathan Bernstein
  • Journalistic ethics
  • Law
  • Litigation PR
  • litigation-related crisis management
  • Media Relations
  • media training
  • online crisis management
  • Online Reputation Management
  • political crisis management
  • PR
  • preventable crises
  • privacy breach
  • privacy violation
  • Public Relations
  • recall crisis management
  • Reputation Management
  • Risk Management
  • SEO
  • social media
  • social media crisis management
  • social media policy
  • social media reputation management
  • sports crisis management
  • violence prevention
  • vulnerability audit
  • Weiner Awards
  • workplace violence

Blogroll

  • Bernstein Crisis Management Blog
  • Jonathan Bernstein's HuffPost Blog
  • The Crisis Show

Related Library Topics

  • Assessments
  • Business Insurance
  • Computer Security
  • Coordinating Activities
  • Crisis Management
  • Employment Laws
  • Ethical Analysis
  • Lawyers (Using)
  • Managing Change
  • Marketing
  • Media Relations
  • Organizational Communications
  • Planning
  • Public Relations
  • Risk Management
  • Safety in Workplace
  • Bernstein Crisis Management Blog

Library's Blogs

  • Boards of Directors
  • Building a Business
  • Business Communications
  • Business Ethics, Culture and Performance
  • Business Planning
  • Career Management
  • Coaching and Action Learning
  • Consulting and Organizational Development
  • Crisis Management
  • Customer Service
  • Facilitation
  • Free Management Library Blogs
  • Fundraising for Nonprofits
  • Human Resources
  • Leadership
  • Marketing and Social Media
  • Nonprofit Capacity Building
  • Project Management
  • Quality Management
  • Social Enterprise
  • Spirituality
  • Strategic Planning
  • Supervision
  • Team Building and Performance
  • Training and Development
About Feedback Legal Privacy Policy Contact Us
Free Management Library, © Copyright Authenticity Consulting, LLC ®; All rights reserved.
  • Graphics by Wylde Hare LLC
  • Website maintained by Caitlin Cahill

By continuing to use this site, you agree to our Privacy Policy.X