The Importance of the Cloud-Based Repository

Backup your backup

One of the most attractive features of cloud technology for the average user is the ability to store documents, files, photos and everything else of importance in a cloud-based repository. This has become such a normal and reliable part of existence for many that the notion of losing stored files is almost inconceivable – until it happens.

DropBox has become one of the most popular cloud-storage systems in existence, but it has not been without its security failures. One of the most recent and infamous occurred in October 2014, and involved the alleged theft of 7 million user accounts. DropBox was quick to publicly address the issue, and stated that the breach was due to “third-party services that users allowed to access their accounts.”

DropBox is not alone in these types of security problems, whether the source is a coordinated hack, a glitch, or end-user misuse. Such irregularities do, however, send a shock to the collective system and force the question as to whether duplicate backups are still as necessary as ever. Added to this is the fact that more and more people are choosing to bring their own tablets and computers to work, and are consequently relying on the cloud to act as their central storage site.

A further concern is the size and amount of the data being backed up as well as the upload speed and throttling being imposed.

What Are The Options?

storage-network

Some experts suggest reverting to traditional hard backups of crucial data, either to a company network drive or even to a physical drive, such as a USB stick. DropBox, and others feel, however, that better password management is the ideal solution.

Tech blogger Chris Hoffman suggests a wide range of backup options, including built-in Windows solutions and third-party software as a complement to the cloud.

One key notion to consider is permanence: how often will you be out of touch – severed from the Internet and the cloud? For most people, total temporary excommunication from the Internet is a rare thing, possibly only occurring during a network crash or a city-wide power failure. But even in those circumstances, it is usually possible to re-join via another channel such as a cellphone. As such, an ideal approach might be to use a second cloud backup provider for your most crucial documents: a totally separate system with its own set of passwords.

The ultimate acid test for any company of any size is to ask the simple question: “If I was cut off from my files at this very moment, what would that mean?” The answer to this question should be written down and then acted upon.

With the exception of trips to Internet-deficient areas of the world, or long flights in non-Wifi-enabled planes, both of which allow for adequate preparation, the odds of being separated from the cloud seem low. However, they are still odds, and for them to stay in your favor, a pragmatic and redundant storage and retrieval system must be considered an essential component of business.

By Steve Prentice

JK Chelladurai
Usage-Based Pricing We are now in an era where many businesses are flipping their business model and shifting from subscription-based pricing to usage-based models, to better cater to the modern ‘pay-as-you-consume’ buyer. So what exactly ...
Rahul
How to Start Your Cloud Career Cloud computing is the present. And it is the future as well!! In fact, a quote by Chris Howard says, ‘Cloud Computing is a spectrum of things complementing one ...
Jonathan Custance
IoT and cloud computing are on the increase High-profile cybersecurity breaches are increasingly in the news, a prime example being the NHS incident of May 2017 when services were brought to a standstill for several ...
Yuliya Melnik
DevOps Services Outsourcing The sooner you release your unique idea to the public, the higher the chance that it will receive the lion's share of the audience's attention. Delays in development can lead competitors to ...
Brian Rue
What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.