CCTV.com News: According to the official account of the Ministry of National Security, cloud storage functions have been widely popular in recent years, and their convenience and large capacity are highly favored by the public. Documents, photos, videos, and address books have been "moved" to the cloud one after another. However, while cloud storage brings convenience, if it is improperly used or attacked, there may be certain hidden dangers of missing secrets and need to be taken seriously.
Cloud storage risks are hidden
The high openness of the Internet essentially determines that cloud storage has certain limitations in the field of security and confidentiality. The security of cloud storage mainly depends on its encryption technology and access control and the security measures of service providers. However, once the account is cracked or the service provider has system vulnerabilities, or it is attacked by overseas spy intelligence agencies, it may lead to the leakage of information stored in the cloud or malicious use.
For example, in September 2024, a "disaster-level" vulnerability occurred. When a user used a new folder to create a cloud disk, the system accidentally loaded private photos of other users, including personal privacy content such as selfies and family photos. In addition, cloud storage service providers have been hacked, causing large-scale data breaches in more than 165 well-known companies around the world. All of the above problems highlight the hidden dangers of cloud storage in terms of security.
"No confidentiality is involved in the Internet, and no confidentiality is involved in the Internet", the security and confidentiality regulations have repeatedly emphasized that it is prohibited to store confidential information in non-secure network environments. However, in real life, there are still some people who are greedy for convenience and choose to ignore these regulations. In order to view and use relevant information anytime and anywhere, they easily upload confidential files, data, etc. to the cloud, and store and share confidential files and information through the network disk. This is tantamount to publicly "securing confidentiality" on the Internet, which poses great risks. Once confidential information is leaked, it will not only cause a blow to personal career, but will even cause immeasurable losses to national security and interests.
National security organs remind
National security is no trivial matter, and there are no "outsiders" in keeping confidentiality. The general public should improve their awareness of confidentiality, always keep the security string tight, and keep a good "confidentiality view" in the cloud.
——Strictly observe the confidentiality red line and eliminate the need for confidentiality in the cloud. Relevant units and personnel must strictly abide by the principle of "not confidentiality or not confidentiality" and resolutely prevent uploading, storing and processing of confidential information on the Internet. Be cautious when it comes to personal privacy and sensitive information and try not to upload it to the cloud. If you need to upload it, you can set important information to "No sharing" to prevent information from flowing out. At the same time, all personnel are strictly prohibited from using mobile phone graphic identification function to process confidential documents and materials.
——Reinforce account security and prevent identity theft. You can bind your account to your mobile phone, email, etc., and use the "dynamic code" to verify when logging in. At the same time, set complex passwords and modify them frequently. Once you notice abnormal operations such as logging in from another place in your account, you must change your password immediately.
——Please operate carefully in the cloud and control the flow of data. Carefully select the automatic backup function of photos, address books and other information provided by the service provider to the cloud. Before storing the data in the cloud, encrypt sensitive data through professional software, or use the encryption function that comes with cloud disk to directly select the encryption option when uploading files. For files that need to be shared, it is recommended to enable the "Extract Code" function before sharing and set access permissions to avoid data leakage due to excessive sharing.



