Wednesday, May 22, 2013

Cloud Safety: A Survival Guide

Protecting Your Privacy in the Cloud
Creative Commons image source

Safety in the Stratosphere

There is no doubt that cloud technology is revolutionizing the digital sphere. It's efficient, it permits employees to work from almost anywhere, and reduces the amount of money needed to be spent on data storage hardware. However, with the sheer proliferation of cloud-based computing, the question of privacy arises. How do you ensure that your information remains protected when it is stored online?

IT Advice

  • Encrypt personal data: When saving personal information to an online storage source, it is best to encrypt the data. Identity theft and fraud are rampant on the internet, and as the old mantra goes, it's better to be safe than sorry. The kind of information that should be encrypted includes copies of personal documents, bank statements, medical records, property deeds, etc. Confidential business information should also undergo this process. There are numerous simple encryption programmes available to help you protect your data.
  • Back up your info: Cloud technology is not infallible. In the worst case scenario, hackers can erase all your valuable information. The golden rule is to back up everything you don't want to lose on a hard drive or two.
  • Passwords: Don't use the same password for all your accounts. It may be easier for you to remember, but it also makes it easier for nefarious hackers to access all of your accounts. So remember to diversify! Use date combinations that mean something to you. Save the password combinations in your phone contact list under a false name– that way, it looks like just another number to someone who happens to glance at your screen.
  • Two-factor authentication: Simply put, this refers to the use of two methods to confirm your identity. This usually includes a password which you type in, and then an authentication code that is sent to your cellular device. This helps to prevent your social media accounts from unauthorised access, particularly if you are logging in from an unfamiliar device.
  • No daisy chains: Refrain from linking all of your accounts together, for example, using your Facebook login details to sign into other websites. In the event of a hack, all of your interlinked accounts could be accessed. It's better to register social media accounts with a separate email address each time.
  • Choose your devices wisely: Be careful when choosing where to log in. Try to avoid computers that everybody else uses, and if you do end up logging in from someone else's device, remember to clear the cache afterwards. And of course, don't forget to log out. This may seem obvious, but it's amazing how many people completely skip this step.
  • Antivirus Software: Both antivirus and anti-spy software can add an extra layer of protection when browsing the net and accessing your personal data. This makes it a lot more difficult for people to access your system, and as a result, your online information.

So there you have it. Whether you use virtual desktop infrastructure, or even online storage sites such as Dropbox or Google Drive, implement a few of these tips and safeguard your data.




Author Bio:
Grace Matthews is a London-based lifestyle blogger who makes uses of Nasstar VDI so that she can travel and work from anywhere in the world.

0 comments:

Post a Comment

Your Comments are encouraging me, So please put them out!

Related Posts Plugin for WordPress, Blogger...

Latest Posts:

 

Blog Archive