tag:blogger.com,1999:blog-18164409.post3568489051006483034..comments2024-03-21T11:03:31.273-07:00Comments on CIS 471: James Fallows -- what happens when six years of Gmail is hacked and deleted?Larry Presshttp://www.blogger.com/profile/14903269871983592883noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-18164409.post-26764407270363509902011-12-28T22:13:38.892-08:002011-12-28T22:13:38.892-08:00Your are right professor. Someone trying to steal ...Your are right professor. Someone trying to steal information digitally, can do it physically as well i.e robbery as you mention. Backing up information in the cloud and a hand held device is the safe way to go. In case one method fails, the second one is there to back it up.Brian Arriolahttps://www.blogger.com/profile/14075796078714308456noreply@blogger.comtag:blogger.com,1999:blog-18164409.post-33255331818772225562011-12-28T21:30:13.626-08:002011-12-28T21:30:13.626-08:00Brian,
Probably the safe thing to do is to keep a...Brian,<br /><br />Probably the safe thing to do is to keep an extra local copy and a copy online. Local copies can be lost to -- for example in a robbery or fire.Larry Presshttps://www.blogger.com/profile/14903269871983592883noreply@blogger.comtag:blogger.com,1999:blog-18164409.post-88789621552013861322011-12-28T13:28:59.422-08:002011-12-28T13:28:59.422-08:00This goes to show that trusting only the cloud is ...This goes to show that trusting only the cloud is not a good idea. Storing information on spare hard drive or machine is a good back up.<br /><br />As we move more in to the digital age I feel that more and more attack will occur. Companies should really strengthen there security to further protect there information. Things change rapidly so next year maybe attack wont be in the low thousands but it in the high thousands. <br /><br />Users should also take steps to lower there chances of being attacked. A quote from the article states "...if a password can be found in a dictionary, that password is not safe". User should change there password constantly to avoid attacks. <br /><br />Both companies and users should take security measures.Brian Arriolahttps://www.blogger.com/profile/14075796078714308456noreply@blogger.com