<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Amazon S3 Bucket Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/amazon-s3-bucket/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/amazon-s3-bucket/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 23 Jul 2020 20:55:20 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Amazon S3 Bucket Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/amazon-s3-bucket/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 038 Shadow IT</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 23:05:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon S3 Bucket]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Breach]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Internet Hotspot]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[USB Memory Sticks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2233</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT. What is shadow IT? It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples: Used for risky Internet access&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT.<span id="more-2233"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2233-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4</a></video></div>
<h3>What is shadow IT?</h3>
<p>It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples:</p>
<h3>Used for risky Internet access</h3>
<p>One would be where staff might use their mobile phones as an internet hotspot to be able to access the internet unrestricted, through their phone rather than through maybe a tightly controlled firewall on their local network. The risk here is that they may be able to access sites that may bring malware into the network and effectively they&#8217;re bridging the insecure internet to your local network.</p>
<h3>USB memory sticks &#8211; burn them with fire</h3>
<p>There&#8217;s always the risks as well associated with the use of USB memory sticks, that people are picking up at conferences and things like that. With no idea where they&#8217;re coming from. What&#8217;s on them. So there&#8217;s always been a risk around those.</p>
<h3>Cloud Storage &#8211; it&#8217;s only as secure as you can make it</h3>
<p>Finally if Staff were to use personal cloud storage services like a Dropbox or a Google drive or an Amazon S3 bucket, the organisation if they are unaware that, they don&#8217;t know how well secured those platforms are. They don&#8217;t know whether the data could be potentially breached from those cloud storage services. So there is a risk there.</p>
<h3>What&#8217;s the real problem that Shadow IT creates?</h3>
<p>And with all these technologies, the main risk here is in fact that they&#8217;re probably going to give you a breach of the GDPR in that you&#8217;re not in control of your IT security.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Shadow IT. When we find it, we can provide guidance on how to remediate it to everyone&#8217;s satisfaction.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4" length="25454938" type="video/mp4" />

			</item>
		<item>
		<title>Cloud Security is your responsibility.</title>
		<link>https://www.l2cybersecurity.com/cloud-security-your-responsibility/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 25 Sep 2017 14:17:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Amazon S3 Bucket]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=918</guid>

					<description><![CDATA[<p>I see a read a lot of cyber security stories and nothing surprises me any more. I constantly see stories about breaches and phishing. Now I turn my jaundiced eye on cloud security.This was prompted following a recent conversation I was having with a friend who is an IT Infrastructure expert. We were chatting over&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cloud-security-your-responsibility/">Cloud Security is your responsibility.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-919" src="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/Insecure-Cloud-150x150.png" alt="cloud security" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/09/Insecure-Cloud-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/09/Insecure-Cloud.png 300w" sizes="(max-width: 150px) 100vw, 150px" />I see a read a lot of cyber security stories and nothing surprises me any more. I constantly see stories about <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/">breaches</a> and <a href="https://www.l2cybersecurity.com/gmail-users-phished/">phishing</a>. Now I turn my jaundiced eye on cloud security.<span id="more-918"></span>This was prompted following a recent conversation I was having with a friend who is an IT Infrastructure expert.</p>
<p>We were chatting over a coffee about the various mistakes people make when securing their own private infrastructure. Things like not <a href="http://www.l2cybersecurity.com/use-automatic-updates/">updating software</a>, having a poorly <a href="http://www.l2cybersecurity.com/have-a-firewall-in-place/">configured firewall</a> and not <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/">testing their backups</a> to name but three. Then my friend came out with a doozy.</p>
<blockquote><p>We store all our stuff up in the cloud and leave Amazon worry about the security side of things.</p></blockquote>
<p>So I asked what &#8220;cloud security&#8221; had they signed up for, which he couldn&#8217;t answer directly, but presumed it was all part and parcel of the package they were paying for. I asked who configured their security and he stared at me like I was a madman.</p>
<blockquote><p>I already said &#8230; Amazon will look after the cloud security. They have world class security solutions.</p></blockquote>
<p>I agreed that Amazon do indeed have the best security available (as do other cloud providers like Microsoft). However <em><strong>assuming</strong></em> that Amazon would &#8220;look after the security&#8221; was a risky presumption to make.</p>
<p>It all depends on what you sign up for. Amazon/Microsoft will provide you with cloud storage and other services. They will also provide you with the tools necessary to secure your cloud storage. Unless you are engaging them for a full service package, where you completely outsource to them and it is pretty pricey, <span style="text-decoration: underline;"><strong>you</strong></span> are likely to be responsible for your cloud security.</p>
<p>In the last week I have read the following stories:</p>
<ul>
<li>Viacom (who own Paramount Pictures) had a publicly accessible <a href="https://www.upguard.com/breaches/cloud-leak-viacom">Amazon S3 bucket</a> containing a lot of very juicy technical details of their infrastructure set-up. It contained a server manifest along with passwords.</li>
<li>Verizon Wireless, the mobile arm of the US Telecomms giant, had a publicly accessible <a href="https://mackeepersecurity.com/post/verizon-wireless-employee-exposed-confidential-data-online">Amazon S3 bucket</a> containing some apparently confidential documents which had user IDs and passwords in them, among other items.</li>
<li>SVR Tracking, a US based Vehicle Tracking service provider, had a &#8230; you guessed it &#8230; publicly accessible <a href="https://mackeepersecurity.com/post/auto-tracking-company-leaks-hundreds-of-thousands-of-records-online">Amazon S3 bucket</a> containing over half-a-million records of vehicles, user IDs, passwords, as well as where the tracking device is hidden in the vehicle.</li>
</ul>
<p>So just these three examples from the last week show that people are putting stuff &#8220;into-the-cloud&#8221; in these insecure <a href="https://aws.amazon.com/s3/">Amazon S3 buckets</a>, presuming that Amazon will look after the security for them.</p>
<p>Please don&#8217;t make the same mistake yourself.</p>
<p>If you have any sort of Cloud storage in use at your business, please take a few minutes now to review it&#8217;s security set-up and ensure it is not publicly accessible.</p>
<p>Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/cloud-security-your-responsibility/">Cloud Security is your responsibility.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
