Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking
    • Storage

    Dropbox Password Breach Highlights Cloud Security Weaknesses

    By
    Wayne Rash
    -
    August 3, 2012
    Share
    Facebook
    Twitter
    Linkedin

      The now well publicized Dropbox security breach was the result of two things that Dropbox could have foreseen, and could have prevented. The first was failing to anticipate user misconduct, and the second was failing to take steps that would allow the site to remain secure even if the users weren€™t. This was exacerbated by Dropbox employee practices that should never have been allowed and by lax management oversight.

      In other words, Dropbox created the perfect storm when it comes to security. For me, the whole thing took on a form of déjà vu. A few days prior to the disclosure of the Dropbox breach, I€™d been chairing a panel at the NetEvents Americas Press and Analyst Summit in Miami. The topic of that panel was specifically about the security challenges to mobile users of cloud applications and services. A significant part of the discussion was about just the sort of weakness that Dropbox revealed.

      The list of problems with Dropbox was hardly surprising since the same list applies to other providers of public cloud services. First, the security depends solely on a name and password to gain access to a person€™s files. Second, Dropbox apparently had no oversight into employee practices, including the use of live customer data in development. Third, it€™s fairly clear that Dropbox had not provided adequate training in basic security practices such as password reuse.

      Because of these shortcomings, the Dropbox breach was not a matter of if it would happen, but rather when it would happen. In this case, the only thing that we know has happened was that a number of Dropbox users got some spam for gambling sites. As far as we know, only the customer email addresses in the Dropbox employee€™s breached storage area were compromised.

      Dropbox has now promised to clean up its act. The company will begin requiring two-factor authentication, a way to spot suspicious activity and a means for users to examine the activity on their accounts for suspicious activity. And the company is asking for password changes on some accounts. If you€™re a Dropbox user you should at the very minimum change your password to one that€™s both very strong and unique, and don€™t wait for the company to tell you to do it.

      Unfortunately, the Dropbox breach has implications that stretch far beyond Dropbox. Most public cloud services have similar weaknesses because they, too, rely only on a user name and password to protect the data. If that information becomes known then the contents of a user€™s cloud storage area are open for the taking.

      Encryption Is a Must for All Sensitive Data

      Since it€™s unlikely that you can depend on your public cloud provider to provide really good security any time soon, you need to take matters into your own hands. Here are a few things you can do:

      • If possible, make sure your user name and password are unique to the service. If you must use your e-mail address for a user name, then use one not used elsewhere, even if you have to create one.
      • Don€™t share your login information.
      • Don€™t ever, under any circumstances, put documents or records subject to compliance requirements into a public cloud service. Not ever.
      • Encrypt any files you put into a public cloud service before you upload them. There are a number of ways to do this, including some open source automatic encryption packages.
      • If you€™re using a public cloud service, change your password. Now. Then do it again on a set schedule. This helps ensure that if you did reuse your password, a hacker won€™t have as much likelihood of getting to your data.
      • Don€™t make the public cloud service the only place where you store critical data. It€™s great as a place to keep presentations so you don€™t lose them, pictures of your pets and grandchildren so you can show them off and things like to-do lists. If the data contains information that needs protection, such as credit card or social security numbers, encrypt it or don€™t store it there.
      • Keep tabs on your account, check it for unusual activity or unexpected changes to content, or other evidence that someone else may have been there. If you find that, either change your password immediately, or get your stuff out of the cloud, close your account and find another provider with better security.

      The one thing missing from Dropbox€™s statement about its breach is more detail on what they€™re doing in terms of additional controls. Did they remove the employee from a position in which they had contact with customer data? Is there better management oversight? Is the company improving its training?

      The sad truth is that there is no shortage of dumb things that users can do to compromise security. This has never been a secret and it isn€™t now. Dropbox should have anticipated this, and should have taken steps to make sure it wouldn€™t happen. Perhaps now the company will take those steps.

      What it means to you is that before you store data that€™s even remotely important or sensitive, check the security policy and practices of the cloud service you€™re planning to use. Then encrypt everything anyway.

      Wayne Rash
      https://www.eweek.com/author/wayne-rash/
      Wayne Rash is a freelance writer and editor with a 35-year history covering technology. He’s a frequent speaker on business, technology issues and enterprise computing. He is the author of five books, including his most recent, "Politics on the Nets." Rash is a former Executive Editor of eWEEK and a former analyst in the eWEEK Test Center. He was also an analyst in the InfoWorld Test Center and editor of InternetWeek. He's a retired naval officer, a former principal at American Management Systems and a long-time columnist for Byte Magazine.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×