Data Protection – Protecting your data in the cloud

Data ProtectionLike many people, you probably store a lot of important information in your cloud applications. I log into my cloud daily (and stay connect almost all day long) and rely on having access to my data wherever I go. Our clouds are probably tied to lots of other services that help us manage our business and life.

Unfortunately, online data is also valuable in the eyes of spammers and other people looking to do harm. If you have sensitive information in your cloud, it may also be at risk of improper access. Your cloud provider is most likely taking appropriate precautions to protect your valuable data, but are you?

Stay one step ahead of the bad guys

Account hijackers prey on the bad habits of the average Internet user. Understanding common hijacking techniques and using better security practices will help you stay one step ahead of them.

Don’t re-use your passwords: Most users make it easy for hackers, many use the same password for everything. If you are like me, you have several online accounts, i.e: several emails accounts, Facebook, LinkedIn, your company cloud and the list goes on and on. Don’t make it easy for a hacker once they’ve gained access to one account by allowing them access to all of you data. And by all means, practice good password protection by using uncommon and special characters, and numbers too. It is a lot harder to hack an account when your password is “8hr%%2P” than it is if you have something like “carrie1234”.

Malware: You use a computer with infected software that is designed to steal your passwords as you type (“keylogging”) or grab them from your browser’s cache data.

Phishing: You respond to a website, email, or phone call that claims to come from a legitimate organization and asks for your username and password. Never give your username and password to anyone!

Brute force: You use a password that’s easy to guess, like your first or last name plus your birth date (“Laura1968”), or you provide an answer to a secret question that’s common and therefore easy to guess, like “pizza” for “What is your favorite food?”

As you can see, hijackers have many tactics for stealing your password, and it’s important to be aware of all of them. File Access

Take control of your account security across the web

Online accounts that share passwords are like a line of dominoes: When one falls, it doesn’t take much for the others to fall, too. This is why you should choose unique passwords.

And follow these steps to protect your data, yourself and your company:

– Never re-use passwords for your important accounts like online banking, email, social networking, and commerce.

– Change your password periodically, and be sure to do so for important accounts whenever you suspect one of them may have been at risk. Don’t just change your password by a few letters or numbers (“Alvin5” to “Alvin6”); change the combination of letters and numbers to something unique each time.

– Never respond to messages, websites, or phone calls asking for your online username or passwords; a legitimate organization will not ask you for this type of information. Report these messages as soon as you get them to the appropriate people.

We hope you’ll take action to ensure your security across the web. Run regular virus scans, don’t re-use your passwords, and keep your software and account recovery information up to date. These simple yet powerful steps can make a difference when it really counts.

If you would like, we provide a Free Technical Assessment, this can be beneficial to new and startup companies that are not sure where to start.

Raven Cloud Computing offers: Cloud Computing | Online File Storage | Hosted Exchange | Cloud Desktops | Cloud ServersVOIPSupport

, , , , , , , , , , ,

About Barry Bestpitch

Barry Bestpitch has helped a wide range of businesses launch, re-brand, and flourish. Barry has worked in various business development , marketing positions and executive staff positions, he is experienced in all media and in small and large scale marketing. He is strong at writing business plans and proposals as well as aiding with your funding search. Barry has acted as a coach and mentor to many business owners and executives.

View all posts by Barry Bestpitch


Subscribe to our RSS feed and social profiles to receive updates.

5 Comments on “Data Protection – Protecting your data in the cloud”

  1. Barry Bestpitch Says:

    Here is an related video from Newsy Multisource Video News regarding social media and your privacy. This story is downright scary and sort of disgusting.

    Thx -b


    • Isabel Says:

      Managed Services and Cloud computing are 2 different aspects. They can be used separately or conjointly. For me managed services in a Cloud environment is an extra layer of services that the Cloud provider offers to its clients. By managing the offered services, the provider will be able to guaranty better SLA, resiliency, high-availability environments. In counter part, as the provider will provide more guaranty on the service, it will reduce the flexibility of a customer to have a full customized environment. For example, the provider will restrict his service catalog and will be able to give SLA on a given database solution only if he manage himself the patches lifecycle.


  2. TechUpdates Says:

    Wonderful article, I enjoyed reading it and you added a new persepective to it. Kudos!


  3. back services Says:

    Woah this weblog is excellent i love studying your articles. Keep up the great paintings! You know, a lot of people are looking around for this info, you can help them greatly.


  4. Harish Says:

    During an average Internet session, most people end up with several browser windows and tabs open, and logged into various accounts, such as Facebook and email. Ending a session without logging out of these sites puts you at risk of having your information stolen. Remember to always log out of all accounts (each of which should have a different username and password ).


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: