This doesn’t bode well for the future. Eileen Yu:
Hackers today continue to outsmart cloud service providers and local jurisdictions involving cloud data, such as those in the U.S., have triggered serious concerns about data sovereignty. However, the lack of security assurance shouldn’t stop enterprises and consumers from embracing cloud and mobile services because, unless you cut the internet cord and completely unplug, there can never be guaranteed security.
Instead, security strategies and best practices should focus on mitigation, so both businesses and consumers know what to do when a security breach occurs. Network defense and protection are important, but a sound risk mitigation strategy will enable enterprises to minimize losses and damage when — not if — a security breach occurs.
Let’s not stop the cause of the disease, let’s treat the symptoms.