Improving Safety On The Digital Highway

Digital Highway Safety

When it comes to transportation, safety is highly consequential. From educational programs to legal penalties, safety is principle to the way that travel is spoken about and acted upon.

But what about digital travel? Although user files are hardly as important as users themselves, they often contain sensitive information. As cloud computing’s momentum increases, both users and cloud storage providers should be thinking about digital storage in terms similar to personal transportation.

On this digital highway, industry standards for safety should further the following:

Safeguarding Basic User Information

With the average household containing five connected devices, digital users are easy prey to hackers. Popular cloud storage providers, which rely on inadequate end-to-end encryption software to curb ISP hacking, remain susceptible to information breaches.

Like seatbelts and airbags, cloud storage providers should include features in their platforms that optimize user safety. These features should be innate, and, with minimal effort from users, constantly working to improve the well-being of stored information. The best cloud storage platforms should incorporate:

  • Client-Side Encryption: Unlike end-to-end encryption, which transfers files across third-party servers, client-side encryption performs all encryption directly on a user’s device. This means that plain text files never need to leave a user’s device unless the user wants them to.
  • Personalized Encryption Keys: To maximize security when encrypting files, cloud storage providers should only allow a single encryption key. With client-side encryption, users set their own passwords, giving them complete control over the safety of their files.
  • Zero-Knowledge Privacy Guarantees: With encryption happening solely on a user’s device, cloud storage providers are blind to the type, content or name of the files that a user stores. Similarly, because users are in control of their own encryption keys, passwords and user information are never stored on a provider’s servers. Although this means that if a key is lost the corresponding files can never be unlocked (not even the platform knows a user’s key), the strategy is an effective way to increase user responsibility over cloud storage and transportation.

Educating Users on Current Trends

Not only should cloud storage platforms protect user data, but they can simultaneously encourage users to increase their own understanding of cloud storage trends. Cloud technology is complicated and highly technical, and, like driver’s education or roadside billboards, bite-size tips can educate users on easy ways to keep their data safe.

For example, Barbie’s newest reincarnation, Hello Barbie, could inappropriately store children’s interactions on the cloud. While many parents fail to recognize the impact of the cloud on their daily lives, storage providers can highlight simple strategies to safely navigating the digital universe.

Providing Users with Storage Choices

Safety is not a universal experience, and what feels safe to one person might feel completely unsafe to another. When picking transportation, users are given multiple options to personalize their safety: car or train, cheap or expensive. Similar opportunities exist for cloud storage providers.

As all encryption happens on a user’s device, providers using client-side encryption authorize users with complete control over what data is encrypted. When storing a wide range of personal files, discretionary encryption helps users keep safe what needs to be protection most. For example, users can choose not to encrypt photos to allot easy sharing, while encrypting loan documents or other private files to increase their safety.

When getting into a car, one of first things drivers do is buckle their seatbelts. On a plane, passengers sit through an extensive emergency evacuation plan. And even on a roller-coaster, riders are advised to keep their limbs inside of the ride at all times. Across all modes of transportation, brands and businesses work to ameliorate safety standards.

For most, transportation security is second nature, and the same level of attention should apply to cloud storage security. Improved security features are increasingly important too, as industry leaders speculate that 2015 could be the worst year for hacks ever. Through additional security features, cloud storage providers can give users optimal protection, which, until now, has been troublingly absent from cloud storage systems.

It might be the worst year ever, but, in adopting better security measures, cloud storage providers have the opportunity to influence just how bad it will be.

By Tunio Zafer

Episode 16: Bigger is not always better: the benefits of working with smaller cloud providers
The benefits of working with smaller cloud providers A conversation with Ryan Pollock, VP Product Marketing and Developer Relationships for Vultr.com - Everyone knows who the big players are in the cloud business. But sometimes, ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
Yuliya Melnik
Heroku or AWS Cloud infrastructures are gradually starting to penetrate into an increasing number of areas and various businesses. And this is not surprising because such a ploy allows you to improve internal processes, protect ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.