Three ways enterprises can prevent cloud jacking
Late
on a Friday afternoon, an urgent message hits the inbox of a mid-level
executive at a large data firm. The message seems to be authentic; not only is
the sender identified as the executive’s boss but it is attached to a recent
exchange of legitimate emails between the two.
The
request, however, is unique. The executive is asked to send their password so
their boss can access a system accessible only through their account. It is a
highly irregular request, and the executive hesitates long enough to place a
call. This results in a shocking discovery: There has been a breach in the
company’s cloud infrastructure.