Welcome to Part 1 of the Cryptyk’s Threat Analysis Series where we evaluate each of the 5 major threats to the cloud for enterprises. In this article we will analyze the threat of external hackers, and how Cryptyk’s hybrid blockchain technology acts to counter this major security threat.
In our introductory article, we touched upon the ever-increasing frequency of large scale security breaches. It is not a question of if a major cloud storage provider gets hacked, it’s a question of when and how big? All major cloud storage providers such as Google, Amazon and Box store dozens of copies of every file you upload, stored in different servers all over the world. This level of redundancy enables them to offer 24/7/365 access on a global scale, regardless of the integrity of any individual storage servers.
Cloud storage providers will never lose your data and they do their very best to protect it. However, once a single server is breached a hacker can copy millions of confidential user files. This is the fundamental weakness of conventional centralized cloud storage platforms. Defense strategies currently used by cloud providers are usually based around fire-walling users in silos to limit the extent to of the attacks to a few hundred thousand users at a time. However, over time, any files stored on the cloud will inevitably be stolen.
But what if your file is never stored in one piece or in one place on the cloud, until you personally start accessing it again?
We introduced Cryptyk’s Vault component in the introductory article, and it is the component of hybrid blockchain technology that plays the key role against these external attacks.
