More and more consumers are using the cloud to store their most valuable information, thus, cloud security is put on the agenda, the application of a variety of possible verification methods, hoping to protect the user's use of security. For consumers, cloud technology is a great gospel: it allows consumers to store at a very low cost or zero cost of mass information - music, information, photos and so on. With a variety of services, people can store more data at will, without having to buy additional equipment, such as hard drives or memory sticks.
From this point of view, cloud technology is like a giant free storage cabinet, but it also has a special security risk. Unlike physical file cabinets, the data stored in the cloud may be at risk of theft by global cybercriminals. If these lawless elements attack, they are likely to get a lot of information.
The most common way for criminals to invade cloud services is to steal a consumer password and then enter his account. The way they implement this approach includes invading the cloud service company's database, spoofing consumers by providing their passwords (usually using e-mails disguised as cloud service companies) or directly guessing the user's password because many consumers are still using those It is not difficult to guess the password, such as "123456" or "password". At the same time, consumers may re-use the same password, which will lead to a series of accounts have been invaded.
"In view of the growing growth of online business, consumers may use the same password on multiple websites, which will put consumers at risk.If a site," says Megan Stifle, director of network security policy at Public Knowledge, Consumer Rights Group, The password is compromised, such as its mailbox account, then the hacker will try to use the same password and simple password variant to invade the most important site in the user's inbox.
Fortunately, cloud services companies attach great importance to the issue of cloud security. Many companies are providing consumers with easy-to-use ways to secure their data. There are three more secure ways. When someone tries to log in to an account from a strange computer, these methods require the login to provide additional information.
The third way to ensure cloud data security does not require the use of mobile phones, but the need for consumers to insert a small secret key device on the computer. The most common of these devices is "Yubikey", made by a company called Yubico, for just $ 19. It can be compatible with such as Facebook and Dropbox commonly used service providers. This way is more secure, because it requires users to log on a strange computer when the secret key entity, and hackers do this is almost zero. The secret key is also faster in this way because it does not need to enter the verification code sent to the phone.
In short, more and more consumers are using the cloud to store their most valuable information, including their files and photos. As people increasingly rely on cloud services, the use of additional security verification means is more important than ever.