Keeping Your Data Safe

Keeping Your Data Safe

Keeping Your Data Safe

Cloud storage has revolutionized the way we keep our files and because most of the established cloud storage providers use the best security and encryption technology available, most of us tend to forget that we have our own part to do in ensuring the safety of our own files. While cloud storage can free us from such worries as having malicious programs sneak into our computer system, there are still practices that we have to observe to keep our data safe in the cloud. If you’re already taking advantage of online storage or plan to move your digital luggage online, here are some tips that can help prevent data loss and unauthorized access to your files.

Use a Unique Password for Your Cloud Storage Account

You may have already read this before but here it is anyway: use a different username and password for each and every site and online service that you use. Again, we reiterate the importance of using a unique username and password for your cloud storage account. Choose a unique password that’s difficult to guess and preferably, consists of a combination of letters and numbers. Doing so can help prevent unauthorized access of your account in case your credentials on other sites and web services get compromised.

Do not Use Easy to Guess Answers to Security Questions

Most cloud storage providers give you a layer of protection in case you accidentally forget your login details. This often comes in the form of security questions. Scammers and hackers, however, can easily bypass this security check if you use answers that are found online. Hackers, for instance, can easily guess your mother’s maiden name by checking your online profile. The smart way to go about this is to answer security questions with fictional answers. If the security question is where you were born, you can answer with a nonexistent “hotel 358”. Do not Share Your Credentials with Anyone

You may be observing best practices to protect your data in the cloud but if you entrust your credentials to someone who does not know anything about safe computing and internet browsing, you may put your data at risk. Avoid sharing your cloud service account username and password with anyone. If you have reason to believe that your account information is compromised, change your login details as soon as possible. You may also contact your cloud vendor’s business phone number to ask them for help and let them know that something is amiss.

Encrypt Your Data

As much as possible, encrypt your data before uploading them online. This can help protect your files in case somebody manages to get your login details. There is a number of encryption software such as Truecrypt that you can use to ensure that only authorized people get to view you online files. File compression programs also give you the ability to password-protect your zipped folders.

Backup Your Files

To protect your data from loss in case your cloud storage provider gets hacked or closes down, it is best to have backups of your data on a physical drive. This may sound ironic because most users use the cloud to back up their files and get rid of physical drives. Just think of it this way: your personal copy may come handy in case you lose your data online. Never, ever keep just one copy of your files.

Use Security Software

You may compromise your cloud data’s security if your own computer system has security issues. Password sniffing malware, for example, may allow hackers to get your cloud account credentials and put your data at risk. Always keep your computer clean and free from viruses and malware by using reliable and updated antivirus software.

By Michelle Simplson

Michelle is a full-time professional editor that focuses on online writing services, specialized in the field of technology like RingCentral cloud phone, business and current trends in the industry.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…