{{ searchResult.published_at | date:'d MMMM yyyy' }}

Loading ...
Loading ...

Enter a search term such as “mobile analytics” or browse our content using the filters above.

No_results

That’s not only a poor Scrabble score but we also couldn’t find any results matching “”.
Check your spelling or try broadening your search.

Logo_distressed

Sorry about this, there is a problem with our search at the moment.
Please try again later.

The world learned a lot about Twitter this week. The most important takeaway: the company doesn't use the best passwords. 

A hacker broke into a Twitter's employees email account in May. From there he was able to access the company's Google Apps account where Twitter shares notes, spreadsheets and financial data within the company. This week, the information started making its way online. 

A leak that size has the potential to derail Twitter's future partnerships, business plans and financial future.

But it's also a setback for Google Apps.

Twitter cofounder Biz Stone wrote on the company's blog that while the docs were "not ready for prime time... they're certainly not revealing some big, secret plan for taking over the world."

And nothing too surprising has come out so far.

Within the documents rested information about when Twitter expected to make money (this quarter), the company's forecasted revenue ($140 million by 2010), and its user growth (1 billion users by 2013).

But the entire episode is proving to be bad PR for Google Apps. Individuals have happily been appreciating the free services of Google Apps allowing them to read, edit and share documents in the cloud. But that ease of use also means that it's easier for other people to get your information from any computer anywhere. And this episode is enough to give companies pause before placing sensitive documents online to share with employees.

On the Twitter blog today, Stone was adamant that Google Apps were not to blame for the security breach: "This attack had nothing to do with any vulnerability in Google Apps which we continue to use."

But his next line gets to the crux of the problem: "This is more about Twitter being in enough of a spotlight that folks who work here can become targets."

What company does not have rivals that would want access to private financial data? Sharing documents online will continue to be a problem because individuals will continue to be careless. And while Google Apps may not have any inherent security lapse, the individuals who use the service will continue to screw up and get scared by how easily they may do so.

As more services move into the cloud, companies have to be very careful about what they are sharing and where. For corporate usage, there is something to be said for paying the fee for software specific to a computer in one location.

That's not to say that sharing online isn't useful for large groups. But online, companies have to remember that they are only as secure as their weakest password. A point proven by this simple lesson from the Twitter debacle: don't ever use "password" as your password.

Meghan Keane

Published 15 July, 2009 by Meghan Keane

Based in New York, Meghan Keane is US Editor of Econsultancy. You can follow her on Twitter: @keanesian.

721 more posts from this author

Comments (4)

Avatar-blank-50x50

Jason

Surely the use of finger print readers as password entries or at least in tandem with an entered password would make this sort of online documention 100% safe.

Unless of course you loose the digit you use as your fingerprint for access!

about 7 years ago

Avatar-blank-50x50

Matthew Tripp

The wheel of Buddhist terms poster Velcro modular wall mural game. Doctoral dissertation for philosophy, title: The Interpenetration of Buddhist Practice and Classroom Teaching. Technocracy Ethics USA censorship Chinese military intelligence genius clones.

PARASITIC SPECIES INFESTATION alien robot telescope spaceship: audiobook getting things done (GTD is the tag), the first few tracks of PALE BLUE DOT are good,  as we transition to a knowledge based global society

as computing power increases exponentially and ubiquitous web enabled sensors allow for immersion in context relevant buddhist or ethics perspective, national broadband plan...

www.dharmaprinting.com augmented reality sociology subject index and table of contents Chinese military intelligence genius clones life energy word abacus sustainability transmission measurement context mapping twitter.com/globalcide is me Google for EXTINCTCULTURE please let me know what you think about this topic www.computer.org/pervasive (FOLDING@HOME and BIONIC software's, engineering 450 million new species to make deserts habitable or telepathic ecosystem maintenance) autodesk inventor prototyping software for genetics use the audio book list on audibles.com to build course of life coaching training young orphan people to be CIA certified ethical hackers download free at nowtorrents.com because if the current post world war 2 education system was meant to produce factory workers (not critical thinking curriculum video from best teacher nationally then teachers answer questions and do research while the kids watch, pause for Q+A, the videos podshifter software for iTunesU ) how much worse is this continuation of using the bible koran instead of critical mass ecosystem dynamics physics logistics?

google for flashcard database

subliminal education psychological profiling HDTV prenhall.com/dabbagh/

MIT OCW designing your life. The art of war flashcard deck, wikipedia article audio book the 48 laws of power... RAW stem cells movies: Eagle EYE, Minority Report, (gps and audio recording + all video survelance to DVR on web for all probation and parole ankle monitors, put more people on them and use software to monitor them, the probation or parolee pays for the ankle monitor and then gives it back to the probation office then the next probation pays for it again, thus buying another one) broadcom is makeing new version of these chips every two months now GPS + Bluetooth + WiFi + FM combo chip)
audio + video security DVR in juvinile prisons with audiobooks streaming leave the headphones you buy behind for the next inmate

lifehack.org/articles/productivity/the-ultimate-student-resource-list.html

selfmadescholar.com/b/self-education-resource-list

web 2.0 directories: ziipa.com and go2web20.net USE THE TAGS cloud, also lifehacker.com and lifehack.org SHARE 99ebooks.blogspot.com via http://www.care2.com/click2donate/ or http://www.thehungersite.com and http://gizmodo.com/tag/ecomodo/ click every tab every day with iMacro, smarterfox, delicious, colorful tabs, TOOMANYTABS, WebMynd extensions for the new firefox 3.5 browser.
 
youtube.com/homeproject     

about 7 years ago

Avatar-blank-50x50

ThreeTags

As our service shows, cloud-based services are not inherently insecure. It's just most web service providers treat customer data security as low priority.

about 7 years ago

Avatar-blank-50x50

Tim Acheson

Security isn't the only disadvantage of Google Apps. The whole idea of online Apps is flawed and unnecessarily risky.

about 7 years ago

Comment
No-profile-pic
Save or Cancel
Daily_pulse_signup_wide

Enjoying this article?

Get more just like this, delivered to your inbox.

Keep up to date with the latest analysis, inspiration and learning from the Econsultancy blog with our free Daily Pulse newsletter. Each weekday, you ll receive a hand-picked digest of the latest and greatest articles, as well as snippets of new market data, best practice guides and trends research.