Lesson Well Learnt: Killer Tips For Securing The Personal Cloud

Lesson Well Learnt: Killer Tips for Securing the Personal Cloud

The hefty majority of internet users exhibit a significant level of dependency upon the cloud for digital content applications. From attractive personal cloud storage options to utterly useful email and web-services, cloud technology now has its stranglehold deep into the core dynamics of contemporary personal computing infrastructure. While every passing day witnesses cloud service providers pumping in a great deal of monetary funding as well as human effort to render the private cloud a safer abode for digital content, it is important to realize that the proceedings at the user’s end are equivalent of a decisive factor while taking the efficacy of cloud security measures into account.

There are certain types of breaches that extend beyond the scope of mitigation ensured at the user end – the most noteworthy example being the surgically tailored social hack experienced by Mat Honan last week. For the softer genres of hack attempts, a few extra precautionary measures can mark a definite difference between secured content and the otherwise inevitable information leakage.

To start off with, it is an excellent idea to have distinct usernames and passwords corresponding to each of the cloud-based services. This is fairly important as one would never want a single account contravention to trigger an unavoidable avalanche of the same. Furthermore, the passwords must contain an ample degree of controlled ambiguity so that the ultimate guess would still be a hard nut to crack. Blending in complexity serves the purpose pretty well; an inter play of special characters, alphabets and numbers is bound to make the hack a thorny feat to achieve.

Same applies for answers to security questions. It is preferable not to come up with custom designed questions for secondary level security. Sticking with the defaults is the last thing one would want to do. If the latter does happen to be the case, be sure to come up with answers that are not commonplace. As per theory, one of the most appropriate answers to, e.g., your birthplace would be: JUP1T3R – that’s ‘Jupiter’ jumbled up – obscure, distinct enough, and literally out of this world.

Another counter-intrusive measure is to have one’s digital content encrypted. Tousled information would appear non-sense to anybody lacking the password (and spur) to decipher (or crack) it. Setting up data-encryption does require a slight added effort at the user’s end. Obtaining relevant encryption software and having the encryption password(s) off pat is the least that’s needed. The subscription will cost a few extra bucks and it’s worth it.

Two-factor authentication is another effectual mechanism by virtue of which content can be further secured. Introducing an additional dimension of verification, a unique code sent to the users’ personal communication device in real time for example, is all set to bring a higher level of security. Certain service providers prefer a designated device for two-factor authentication purposes. The dedicated device is provided to end-users that generates a pseudo-random sequence at the push of a button. The sequence needs to be seeded in along with the username and password at each authentication instance. If you’ve landed yourself such a gadget, double-check that it’s kept somewhere safe and is reachable.

In addition, it makes perfect sense to have important data backed up. External hard-drives supporting mammoth capacity ranges have now become affordable. Equally effective is the option of having a secondary cloud backing up your primary cloud. Third party cloud services custom tailored to serve as backup cloud are in vogue.

Last but not the least, it’s advisable to have data done with for good when it is no longer in use. This is particularly important for confidential email messages, sensitive information, secretive contacts and so on. Practices such as using an updated antivirus, deploying a website advisor tool, securing your Wi-Fi network, avoiding anonymous file-sharing and, in general, staying away from anything that seems woolly will accentuate digital content’s integrity. Change willingly before hack-events storm in to prove their might.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Personal Space And The Internet of Things (IoT)

Personal Space And The Internet of Things (IoT)

The Internet of Things (IoT) There is a long time concept of the personal area network or PAN. For all intent and purposes this is the maximum distance a Bluetooth device can move away from the host and still be functional. As I read the many wonderful pieces on the explosion of IoT and wearable…

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data The term “Big Data” is highly reminiscent of terms like “Big Pharma”, and it has a tendency to make consumers and professionals alike a bit nervous. However, whereas Big Pharma refers to large pharmaceuticals companies with market sway and seemingly countless political lobbyists, big data simply refers to the exponentially rapid growth…

The Evolution Of The Connected Cloud

The Evolution Of The Connected Cloud

The Connected Cloud Cloud computing is interesting first, but not only, because of the prevalence of cloud projects. There are many of them launched every day. Some have lofty expectations for business benefits (cost saving of 20 percent or more) and others carry even more intriguing goals. In 2005 “the cloud” was new. Shared computing…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

Cloud Computing vs. “Cord” Computing

Cloud Computing vs. “Cord” Computing

Easily Managing Access And Authentication To Both Though end users might not notice a difference between systems and applications hosted on-site or in the cloud at their organization, administrators who manage them often have to do so quite differently. Each solution has different requirements pertaining to security, and access and authentication management. System admins want…

Cloud Pricing: What In The End Am I Actually Paying For?

Cloud Pricing: What In The End Am I Actually Paying For?

Cloud Pricing: What In The End Am I Actually Paying For? I’ve been blogging about this concept now for a while. What is the cost of a cloud solution and what in the end am I actually paying for? I know I am not the only person considering this as I’ve seen any number of articles…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor