Dear Hackers – Please Do Not Kill the Cloud…

Dear Hackers – Please Do Not Kill the Cloud…


Vivek Sood




January 8, 2019

There are already plenty of nude photos in the cyberspace. No matter how attractive these celebrities are, their photos are not worth what is at stake. News Reports have been taken over by the celebrity nude photo celebration. Here is a good summary, in case you missed out:

” MICHAEL BRISSENDEN: Explicit photos of dozens of female celebrities have been dumped on the internet in what’s believed to be one of the biggest celebrity hacking scandals to date. Jennifer Lawrence, the Oscar winning star of the cult movie the Hunger Games, is among dozens of high profile Hollywood actresses to have naked images posted on the internet by hackers. The incident has raised serious questions about the security of internet storage systems.

work-on-keybordSo far I have not made an attempt to see the leaked photos. Come to think of it, I have seen enough of them (when I was working in merchant navy) to last me a lifetime – so I will do this either. Is it really that big a deal? These people had posed for the photos, so assumedly they did not mind some people seeing them in those poses.

It is really of question of which people, and in what circumstances. When I posed for this photo, I did so with full knowledge that some people will look at it, and it might perhaps even leak from my cloud account. I do not mind if it happens; though now that I have put it here in this blog, hacking them will be purposeless. If you have photos of yourself in the cloud that you would not like people to see, delete them or make them public. Privacy is a luxury that does not exist in the global village.

We are all Kardashians now. But, the purpose of this blog is not to decry the loss of privacy – in my view it is overrated anyway. Plus, that bus has departed long ago. Purpose, of this blog is to make a direct appeal to the hackers to not kill the cloud. Too much is at stake. Global economic integration, supply chain 3.0 planning, collaboration, concurrent engineering, even cool products such as the next generation of phones, watches and tablets – none of this will be possible anymore with data residing in cloud and enabling So dear hackers – you will lose your cool products.

You will lose the low prices for great things – cost of everything will go up massively, if supply chain 3.0 planning and collaboration cannot be accomplished. And, you will lose your own ability to send huge files across the internet to your friends. Would you like to see that happen? A few photos of scantily clad (or unclad) bodies are not really worth that much.

Related articles


Copyright - These concepts, frameworks and ideas are copyright of GLOBAL SUPPLY CHAIN GROUP from the time of their creation. Do NOT copy these without permission and proper attribution.


  1. These ideas and concepts will be usually expressed by our thought leaders in multiple forums - conferences, speeches, books, reports, workshops, webinars, videos and training. You may have heard us say the same thing before.
  2. The date shown above the article refers to the day when this article was updated. This blog post or article may have been written anytime prior to that date. 
  3. All anecdotes are based on true stories to highlight the key points of the article - some details are changed to protect identification of the parties involved. 
  4. You are encouraged to comment below - your real identity and email will not be revealed when your comment is displayed.  Insightful comments will be  featured, and will win a copy of one of our books. Please keep the comments relevant, decorous and respectful of everyone. All comments represent opinions of the commentators.

Vivek Sood

Our Quick Notes On Five Flows Of Supply Chain Management

Part of our new “Quick Notes” series – this report answers your most pertinent questions of the topic.

  • What are the five flows of SCM?
  • Why are they important TO YOU?
  • How can you map, track, and optimise these flows to serve YOU?
  • What is the importance of difference between "Supply Chain" and "Value Chain"?
  • What are the stellar case studies of each of the five flows?


USD 20


What Else Exists Besides The Product Flow In The Supply Chain?
Experimental Models In Supply Chain Management
Finance, Sales, HR, Supply Chain – Where Do Most Effective Business Transformation Leaders Come From?
  • Thanks to starting a very sensitive topic that is the security of the cloud. Ultimately, it is the duty of the organization to apply control over the cloud. The regulatory-compliant procedure of public clouds requires that enterprises implement clear guidelines on cloud usage responsibility and cloud risk acceptance processes. Those who don’t implement a tactical approach to the use of cloud computing could eventually discover they have put themselves in an unsecured position.

    Due to constant the increase in security requirements, physical access to data centers will also be strictly limited. For entry into the secure premises, you will not only need be in possession of an electronic key but also undergo a potential procedure for biometric scanning.

    The future of cloud computing and security is extremely promising with a huge opportunity for the technological breakthrough for the companies already using this technology today. The next few years will show the impact cloud will have the world than one has ever been able to imagine. It is compulsory for CEO’s to be aware of the latest innovations in the world of cloud technologies in order to remain competitive. Soon enough, cloud technologies will support working faster and more effectively than it is today.

    • More and more, we are seeing technology moving to the cloud. It’s not just a fad — the shift from traditional software models to the internet has steadily gained momentum over the last 10 years. Looking ahead, the next decade of cloud computing promises new ways to collaborate everywhere, through mobile devices.

  • I agree with this topic. one time I lose all my project data while I was on cloud-based storage and no one responds to my losses. Defiantly, if we won’t change our thinking or use of style. We could lose the benefit of the cloud.

    • Hey Benjamin, Said to hear about your loss i can understand from what you have been suffered it takes time to built a precious project and to lose over after is very said but sometimes cloud-based storage is very useful too.

  • The fate of these celebrities hacks, it turns out, is not only a concern for the famous. In the Internet Age, anyone can become well-known, and in the most unwelcome way, if images or other strictly private content gets hacked from your cloud and put online. These incidents have important cybersecurity lessons for everyone. One point worth noting is that images and other data stored on iPhones are automatically copied to iCloud, Apple’s cloud storage service.

  • We read about hacks of social media accounts and cloud storage all the time, but what’s the point of it? How can someone benefit from hacking a personal social media account, especially a non-celebrity, when there are so many other things to hack? Go steal from a bank or something, right? Not only your cloud but your smartphone can be hacked, it can be done very easily without your knowledge. At the end of the day, everything is hackable.

  • In order to understand how to protect yourself, there is a need to understand some common hacking methods used to hack cloud storage accounts and carve a method of defense. There are real world consequences that you can face if you don’t better secure your social media accounts now. Start with better passwords, add some encryption, and don’t be gullible!

  • The hack may have been as simple as guessing celebrities’ passwords, Apple, which enjoys a generally good reputation for security, has subsequently tightened up its “I forgot my password” safeguards, or it may have involved “social engineering”, tricking someone into revealing their password. Social engineering is the term that cybersecurity experts use for attacks that aim for the human factor. An all-too-common example is spear phishing, which is when a cybercriminal sends an email, usually one that purports to be from a friend or colleague, that has links to a malicious website or file. The unwary victim clicks the link, allowing malware to infect his or her device, where it can ferret out private data.

  • {"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}