Need Reliable IT Services? Call Us Now! (443) 589--1150 | Toll Free: (800) 431--2282

What Security Steps Does Your Business Need to Take Following Cloudbleed?

Internet security breaches occur continuously, but most don’t have effects as far-reaching as those of the so-called Cloudbleed disaster. A Google researcher recently discovered a vulnerability in the code used by Cloudflare, which is one of the biggest Internet security firms in the world. Although the flaw in their code was tiny, it allowed for an unclear amount of sensitive data to leak out across the Internet. Many small business owners are right to question what effect Cloudbleed will have on the security of their company’s sensitive data and critical systems. While that answer is not entirely clear, the steps that small business needs to take to protect themselves.

Cloudbleed

First, let’s take a look at Cloudflare’s background. This Internet security giant has a long list of prominent clients, including Uber, 1Password, FitBit and OKCupid. Cloudflare’s menu of products includes everything from content delivery services to protection against DDoS attacks. So it is ironic that, given that many of Cloudflare’s services center around security, Google researcher Tavis Ormandy recently identified a vulnerability in Cloudflare’s code that causes bits of data to leak during certain processes; this leaked data includes everything from hotel bookings and chat messages to password manager data. In plain English, the leak occurred because Cloudflare’s software had to find a place to store user data once the correct location filled up. Instead of going where it should, Cloudflare’s leaked data ended up being stored on unsecured (and unrelated) webpages.

Knowing all of this, what steps should you take to secure your business’ sensitive data and critical systems? First, don’t bother trying to figure out if your passwords were among those compromised. While CloudFlare says that only a small amount of secure data was leaked, the vulnerability that allowed for this data leak lay undiscovered for six months; no one can say for certain how much data or which data was actually leaked. Furthermore, the nature of the leak means that lots of data may still be exposed even after Cloudflare has patched the issue, and even sites which are not Cloudflare clients could have some compromised data lurking on their servers. In short, trying to determine what sensitive data may have been exposed is a wild goose chase.

What your business should do is proceed as though your information may have been compromised. All of your employees should immediately change all passwords. Log out of any mobile applications after changing your passwords and then log back in. Most importantly, if you don’t already have two-factor authentication implemented, doing so should be your next step; two-factor authentication is not fail-safe, but it will offer your company the best line of defense against hacking.

Do you have questions about whether or not your business’ security protocols are robust enough to withstand threats?

Our experts can help you evaluate the cybersecurity risks your business faces. Contact us today at (443) 589--1150 or info@tieroneit.com.

Used by permission

Alexssa

We have seen a dramatic improvement in efficiencies and productivity (after Tier One upgraded our network). As we move forward I am sure it will be comforting for us knowing we are more protected and more efficient. We cannot say enough about Jason! He has been very helpful though this transition and Tier One will be a good move for us and look forward to the future.

  Hunt Valley Tile and Stone   

Connect With Tier One Technology Partners

  • 11311 McCormick Road, Suite 100 Hunt Valley, MD 21031
  • 70 Thomas Johnson Drive, Suite 100 Frederick, MD 21702
  • Phone: (443) 589--1150 Toll Free: (800) 431--2282 Fax: (443) 589--1165
  • Emergency Support: (443) 589--1150
Tech Council
HTG
CPAmerica Member
Information Technology Alliance
Carroll County Technology Council Member
Howard Technology Council Advisory Board Members