Cloudy With the Chance of Falling Stars

Cloudy With the Chance of Falling Stars

We live in a world increasingly connected, where the so-called “smart devices” assume a leading role in the day-to-day lives of so many people.
Even in societies where the purchase power is still much smaller than that those of richer countries, smartphones and tablets have had an impressive growth and recent efforts by Google to increase its presence in emerging markets such as India, are just an example of factors that tend to accelerate this trend.

Recently the media were flooded with stories about celebrities who saw their intimate photos published on the Internet. This happened because their mobile devices automatically synchronized its contents to their “cloud” area (which basically means a hosted service somewhere on the Internet), which have been subsequently accessed through various methods, from phishing to social engineering, through to brute-force attacks.

These circumstances were generated due to much ignorance of how these devices and associated services really work, the implicit trust in all technology related themes (especially if it is denominated as “smart”) and some blind devotion to certain brands with an aura of infallibility.

These factors result in the discarding of the common sense and a few simple safety rules when using these technologies in favor of an optimism and confidence worthy of a little child that jumps from a high place into his/her father arms thinking: “it doesn’t matter, everything will work out alright!”

These attacks had an unusual media reach due to the notoriety of those involved; but what about the millions of anonymous that are equally at risk daily and that may have been victims to this type of attack?

It is vital the we understand that in the Global Village Era, of the digital information, everything that is online (in the cloud, internet, etc) runs the risk of falling into the wrong hands, if not well protected. And if that happens it becomes impossible to control its spread – digital information can be copied endlessly, easily and without loss of quality.

Not only do we recognize the risk we’re under, but also those malicious people actively looking for easy targets do to. Having that into consideration, being connected to the Net or walking the streets of any big city is not much different. You never know who will cross your way or who may be watching you.

So what to do? Well, let’s start by bringing back a little bit of common sense: if the contents become public or if someone malicious reaches them, what will happen to me? What personal, familiar, financial, professional consequences will I suffer? If you have to think in these terms twice about certain contents, then you better extensively analyze where will this information be stored and protected, because it does matter.

In my next release I will list seven tips that promise to increase your security in an easy and accessible way. Stay tuned!

Leave a Reply

Your email address will not be published. Required fields are marked *