Inside the Briefcase

Augmented Reality Analytics: Transforming Data Visualization

Augmented Reality Analytics: Transforming Data Visualization

Tweet Augmented reality is transforming how data is visualized...

ITBriefcase.net Membership!

ITBriefcase.net Membership!

Tweet Register as an ITBriefcase.net member to unlock exclusive...

Women in Tech Boston

Women in Tech Boston

Hear from an industry analyst and a Fortinet customer...

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

IT Briefcase Interview: Simplicity, Security, and Scale – The Future for MSPs

In this interview, JumpCloud’s Antoine Jebara, co-founder and GM...

Tips And Tricks On Getting The Most Out of VPN Services

Tips And Tricks On Getting The Most Out of VPN Services

In the wake of restrictions in access to certain...

A Guide on Using the Cloud Safely

December 12, 2017 No Comments

Featured article by Calvin Paige, Independent Technology Author

Any small or large business using cloud computing must ensure their files are as secure as possible, which will help companies to protect their data while enjoying the benefits that come with migrating to the cloud. To prevent your files from falling into the wrong hands, read the following informative guide on using the cloud safely.

Consider Using a Cloud Access Security Broker

Before considering your move to the cloud, you should first understand how security works for cloud computing. Unlike traditional IT systems, moving to the cloud means losing certain amount of visibility and control over your data. However, if you want to use the cloud for business critical operations, then you must take the security of that system seriously.

A Cloud Access Security Broker (CASB) provides the needed visibility and security controls that could allow you to take advantage of the cloud without putting your most sensitive and valuable data at risk.

With a CASB, you will gain a greater understanding of user activity, can quickly and easily identify sensitive data within the cloud, can enforce greater data security (think encryption and access control), and can effectively detect malicious or negligent data security threats.

Two Factor Authentication

One password may not be enough to keep a cybercriminal away from your files. While two-factor authentication is not a foolproof plan, it can secure your accounts and, in turn, your data. Also, it is beneficial to review your password settings to set-up notifications if a password is reset, so you can immediately spring into action to protect your files.

Audit Connected Devices

Review the cloud computing service to identify any connected devices or apps that have access to the cloud storage. For instance, if you are using Dropbox, this information will be available in the account’s security settings. You can then remove any connected devices that you do not recognize or no longer use.

Cloud Storage Provider’s Privacy Protections

Do your homework on a provider to learn more about how they will protect your data and handle privacy. For example, some cloud storage services will encrypt data on their servers, so will not know themselves where the data is stored with them. While others might have a greater access to your data, which they may reserve the right to access. These providers may state they provide “bank level security”, which often means they do not provide exceptional data security.

Review Your Files

Many companies are using cloud computing to store most documents. Unfortunately, unless you have introduced a CASB, you could be putting your data in danger. Without the right protections, a cybercriminal could gain access to your accounts. It might be beneficial to audit your files and remove sensitive data to avoid the information falling into the wrong hands.

Consider the repercussions of losing a specific file, and if you have a backup file elsewhere. For example, you might face legal, financial and reputational damage if your customers’ or employees’ financial information falls into the wrong hands. If there are serious repercussions and you don’t have a backup, make a copy of the documents and store it elsewhere, or encrypt it, which will protect both your data and your business.

Do you have any helpful tips for protecting data in the cloud? Share your advice by posting a comment below.

 

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner

WomeninTech