Keeping Your Data Safe

Keeping Your Data Safe

Keeping Your Data Safe

Cloud storage has revolutionized the way we keep our files and because most of the established cloud storage providers use the best security and encryption technology available, most of us tend to forget that we have our own part to do in ensuring the safety of our own files. While cloud storage can free us from such worries as having malicious programs sneak into our computer system, there are still practices that we have to observe to keep our data safe in the cloud. If you’re already taking advantage of online storage or plan to move your digital luggage online, here are some tips that can help prevent data loss and unauthorized access to your files.

Use a Unique Password for Your Cloud Storage Account

You may have already read this before but here it is anyway: use a different username and password for each and every site and online service that you use. Again, we reiterate the importance of using a unique username and password for your cloud storage account. Choose a unique password that’s difficult to guess and preferably, consists of a combination of letters and numbers. Doing so can help prevent unauthorized access of your account in case your credentials on other sites and web services get compromised.

Do not Use Easy to Guess Answers to Security Questions

Most cloud storage providers give you a layer of protection in case you accidentally forget your login details. This often comes in the form of security questions. Scammers and hackers, however, can easily bypass this security check if you use answers that are found online. Hackers, for instance, can easily guess your mother’s maiden name by checking your online profile. The smart way to go about this is to answer security questions with fictional answers. If the security question is where you were born, you can answer with a nonexistent “hotel 358”. Do not Share Your Credentials with Anyone

You may be observing best practices to protect your data in the cloud but if you entrust your credentials to someone who does not know anything about safe computing and internet browsing, you may put your data at risk. Avoid sharing your cloud service account username and password with anyone. If you have reason to believe that your account information is compromised, change your login details as soon as possible. You may also contact your cloud vendor’s business phone number to ask them for help and let them know that something is amiss.

Encrypt Your Data

As much as possible, encrypt your data before uploading them online. This can help protect your files in case somebody manages to get your login details. There is a number of encryption software such as Truecrypt that you can use to ensure that only authorized people get to view you online files. File compression programs also give you the ability to password-protect your zipped folders.

Backup Your Files

To protect your data from loss in case your cloud storage provider gets hacked or closes down, it is best to have backups of your data on a physical drive. This may sound ironic because most users use the cloud to back up their files and get rid of physical drives. Just think of it this way: your personal copy may come handy in case you lose your data online. Never, ever keep just one copy of your files.

Use Security Software

You may compromise your cloud data’s security if your own computer system has security issues. Password sniffing malware, for example, may allow hackers to get your cloud account credentials and put your data at risk. Always keep your computer clean and free from viruses and malware by using reliable and updated antivirus software.

By Michelle Simplson

Michelle is a full-time professional editor that focuses on online writing services, specialized in the field of technology like RingCentral cloud phone, business and current trends in the industry.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

One Response to Keeping Your Data Safe

  1. SIPbizCIS revolutionizes security needs. Scalable Network-Based Identity,Secure End-to-End MultiMedia – SECURE muti-media over LTE networks. All IP. No IMS. No VoLTE. No TDM handoff. US Patent 8,443,082

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…