10 ways to protect data in the cloud

Post on 15-Jan-2015

331 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

Protecting your data in the cloud requires that you first answer these questions: What is “your data?” Where is it and who is using your data?

TRANSCRIPT

10 Ways to Protect Your

Data in the Cloud

Protecting your data in the cloud requires that you first

answer these questions:

What is your data? Where is it? Who is using it?

This is not as simple as it sounds. Data is likely scattered throughout

your organization.

???

? ??

All data is important (or once was) but not equally. Your business

cannot function without some of it.

Some is important but needed infrequently, and some must be

immediately accessible.

Other data ─ in the hands of hackers ─ could

cause big problems.

Still other data should have been erased long ago.

Some is important but needed infrequently, and some must be

immediately accessible.

Profiling and classifying your data will help you make the right decisions about the type of cloud implementation that best suits your needs and the levels of protection various data sets are worthy of.

For our purposes here, we’ll be talking about best practices for protecting important corporate data assets, whatever they might be…

….personally identifiable information, intellectual property, market strategies, trade secrets, material financial information or product production data.

Use a Unique Password

Use different usernames and passwords for every site and online service, using combinations of letters, numbers and symbols to make passwords tough.

Encrypt Your Data.

Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation.

Encrypt Your Data.

Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation.

Always keep your computer clean and free from viruses and malware by using reliable and updated antivirus software.

Use Security Software

Logging in with two-factor authentication requires both username and password, as well as a unique code sent to a device or more sophisticated methods such as fingerprint or iris scans.

Use Two-factorAuthentication.

If You Need It, Back It Up

Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation.

Un-store Obsolete Data.

By regulation, some data have very long shelf lives, but a hefty portion can be expunged if properly managed; the less data you keep, the less your exposure is to loss or theft.

Know Your Provider

Minimizing risk to its lowest level helps maximize the benefits of cloud storage; demand that your provider explains and proves how it does that.

Know Where Your Data Lives

Data that’s subject to jurisdictional restrictions by state or by country must be stored in U.S. facilities and on hardware that is readily identifiable.

The Infrastructure Behind the Claims

Asking who the CSP’s technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure. .

Asking who the CSP’s technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure.

The Infrastructure BehindThe Claims

Whether a CSP’s advanced services are part of the initial engagement or not, knowing they are available as your needs change and grow is good insurance.

Think About the Future

Please be sure to check out our video on complianceClick to View

Contact our solutions engineer today866-473-2510

Chat Now

top related