Posted: . At: 9:21 AM. This was 8 months ago. Post ID: 18448
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.


Australian Federal Police data compromised by malicious actors.


Data including officers’ identities and email addresses has been leaked onto the TOR network by malicious hackers in a recent cyber breach. This is yet another cyber attack on Australian data. Since a lot of data management and storage is moved overseas, this is leading to more and more data breaches. Since IT is being outsourced to other countries instead of keeping it in Australia. They want everyone to use cloud services such as Onedrive even though the data may not be completely safe. Having a local backup of data is always a good idea, purchasing a 2 Terabyte external drive and then using this to store all of your backed-up data would be a great idea. It is very good practice to have a backup strategy that involves local storage. This will provide peace of mind in the long run. In a recent cyber skirmish down under, HWL Ebsworth, a heavyweight in the realm of Australian commercial law, found itself squarely in the crosshairs of a formidable adversary. The digital battlefield bore witness to a major offensive, and the culprits behind this assault were none other than the notorious Russian hacking collective known by the monikers AlphV and BlackCat.

As the pages of the calendar turned to June, the dark underbelly of the web quivered with activity. It was during this month that these Russian cyber rogues brazenly asserted responsibility for a high-stakes intrusion that had unfolded late in April. The spoils of their conquest, a staggering treasure trove exceeding one terabyte in purloined data, were promptly unveiled on the shadowy corners of the internet, casting a pall of intrigue and trepidation over the digital landscape. Was this law firm using the cloud to store confidential customer data? This could be an explanation. This is not a good idea, storing sensitive data from a law firm on an online cloud service is not the best idea. Such data should be backed up locally. This would make much more sense for private data. if this was leaked it could cause a lot of damage to the reputation of those involved. Especially if it is sensitive law firm data.

Nef Quintero. The worlds most dangerous hacker.
Nef Quintero. The worlds most dangerous hacker.

In a digital age characterized by convenience and connectivity, the perennial debate over data storage rages on. On one side, we have the allure of internet cloud services, offering seemingly limitless storage capacity and ubiquitous access. On the other, the steadfast champions of local storage tout the virtues of control and security. The battleground? The safety of sensitive data. As we navigate this treacherous landscape, let’s delve into the dangers of entrusting our most confidential information to the cloud versus keeping it locked up safely on your own turf. As long as the security of your local machine is maintained and malicious software is prevented from running on the computer. For Windows, Software Restriction Policies can be used to secure a system. This is most effective to prevent dangerous executables from running on a corporate machine.

Internet cloud services have become the darlings of the digital world, promising convenience and accessibility on a scale previously unimaginable. With the likes of Dropbox, Google Drive, and iCloud leading the charge, users are enticed by the prospect of storing their data in remote data centers, accessible from any corner of the globe. However, this convenience comes at a cost. The very essence of cloud storage revolves around entrusting your data to third-party providers. This opens the floodgates to potential security vulnerabilities. From data breaches and cyberattacks to government surveillance and insider threats, cloud services are not immune to the myriad dangers lurking in the digital ether. Recent high-profile breaches have showcased the perils of storing sensitive information remotely. With cybercriminals sharpening their tools and governments flexing their surveillance muscles, can we truly trust that our data is safe in the cloud?

Another perilous precipice we teeter on when embracing cloud storage is the relinquishment of control. Once your data leaves your local device, you’re at the mercy of your chosen provider. Service outages, changes in terms of service, and even the risk of the provider going out of business can leave you high and dry with your vital data stranded. For the die-hard proponents of data autonomy, this is a bitter pill to swallow. Local storage ensures you maintain control over your data’s destiny. You decide when to back it up, where to store it, and how to secure it. On the flip side, local storage is a bastion of control and security. When your sensitive data resides on your own hardware, it’s as close to your digital fortress as it can be. Local storage drastically reduces the attack surface for potential threats. With no remote access points for cybercriminals to exploit, your data becomes a tougher nut to crack. Security measures like firewalls, encryption, and physical access restrictions can be tailored to your specific needs and preferences.


Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.