Cloud computing system practical tips to secure your data

Preview:

Citation preview

Cloud Computing SystemPractical tips to secure your data

While the cloud has indeed grown in a big way over the last two years, 2012-14, the inherent security issues associated with cloud computing still make businesses feel unsafe. All credits to the increasing number of online hackers.

Is your data safe?

The following slide deck provides you a few security tips which would help you secure your data on the cloud.

Don’t Upload Sensitive DataPersonally identifiable information, credit

card records, medical records, and plenty of other data are highly sensitive in nature.

Only non-sensitive data should be moved to the cloud.

Hybrid cloud model can be adopted where sensitive data is stored in a secure private cloud and rest is stored in a public cloud.

Take passwords seriouslyThe most popular passwords in

cyberspace are actually “123456” and “password!” 

The passwords should be changed frequently. Unique passwords should be used for each account. 

Most people also use the same password for all their accounts thereby compromising all their accounts if any one gets hacked.

Encrypt Data

Some of the multi platform encryption tools are are B1 Free Archiver, DrivePop and TrueCrypt.  

Encryption offers an additional layer of security, giving attackers garbled and useless data without the decryption key.

Cloud service providers such as SpiderOak and Wuala offer local encryption and decryption.

Set access rights and notificationsThe best approach in the cloud is a

“needs-based” approach.   

Ensure limited access on data to only those who really need it.

The higher the number of users with access rights, higher the odds of data being stolen or compromised.

Consider adequate security safeguards

Any credible cloud service would have antivirus, anti-malware, firewalls, encryption controls and other security features  

In fact, when the stakes are high, it may be worthwhile to test the effectiveness of the cloud service provider’s security by deploying ethical hackers.

Read the fine print

Most users simply scroll through the terms and conditions before clicking on “I Agree.”  

If all, or even a sizable number of, users do that, cloud providers would have no option but to shun shortcuts and take security seriously.

Users need to be aware of what they are signing up for.

Suyati provides marketing technology and integration services for companies that wish to combine the best of breed solutions and create a unified approach to customer acquisition. This unified digital marketing approach requires system integration between various CMS and CRM platforms, and a slew of eCommerce, Marketing Automation, Social Media Listening, email and social marketing, and customer service systems. Our specialized knowledge in Salesforce, open source and .Net based systems enables us to build effective custom integrated solutions for our clients.