April 21, 2025
Trending News

How to keep personal information safe in the cloud

  • July 2, 2022
  • 0

An artificial intelligence cloud reads computer data The cloud, which has more storage capacity than the local storage of equipment, forces people to store most of their information,

How to keep personal information safe in the cloud
An artificial intelligence cloud reads computer data
An artificial intelligence cloud reads computer data

The cloud, which has more storage capacity than the local storage of equipment, forces people to store most of their information, such as photos and documents, in places like Drive or Dropbox, a more common trend among companies that need to manage large amounts of data. .

That’s why Infobae has compiled a list of 6 tips to keep your cloud data safe

Cloud misconfiguration detection:

When we talk about misconfiguration in the cloud, it refers to the misconfiguration of the services provided in the cloud, or the fact that the default security settings do not provide adequate protection of user data.

This is very important, especially for companies, because, for example, personal use services of Google Drive already include settings for high security systems by default, as well as other information storage in the cloud.

However, when it comes to cloud services for corporations, which typically require more detailed setup and trained personnel, there can be gaps in security settings that expose company data.

On the part of users, it is recommended to check the privacy settings that they have activated in the cloud storage services, which are usually accessed by tapping or clicking on the account profile. As for companies, it is necessary to conduct periodic audits to determine that there are no vulnerabilities in privacy and security settings.

Conduct hacking exercises

According to Zoho’s Manage Engine, this tip is especially intended for organizations to conduct penetration tests that simulate cyber attacks to measure the strength of their systems’ security seals.

On the other hand, people can scan their computers weekly with antivirus software installed and also check what security extensions they can add to their browsers, always making sure they are official from a cyber security brand.

Be cautious of all cloud activity

Both consumers and companies tend to manage several data hosting services in the cloud, for example, they have an account in Drive and another in Outlook, and files are created and stored in both to have more storage capacity.

with the above, Manage Engine says this It is very important that you do not forget to follow certain security habits, such as periodically changing access passwords and not using the same one for all accounts, except for a few characters between numbers, symbols, upper and lower case letters.

However, some companies use cloud-based systems for visibility of all activities, thereby centralizing information from all platforms.

Enable different types of authentication

Offices often include strict identity management controls for their corporate accounts through two-factor authentication and other procedures. This type of added security can also be applied to email and personal accounts through apps like Google Authenticator.

Block suspicious IP addresses

Today, most antivirus programs include features that protect not only computers from potential threats, but also Internet browsing.

Therefore, it is not superfluous to activate these software tools that allow you to block malicious websites that can steal information from cloud storage.

Implement cloud access security systems

As mentioned earlier, companies are at a greater risk of becoming a victim of attacks in which information is stolen from cloud storage, unlike people, because they process huge amounts of information and you cannot control the behavior of each collaborator.

For this reason, it is important for companies to include cloud access security agents, known by its acronym (CASB), which are policy control mechanisms and visibility of information uploaded by users to the cloud.

Finally, Manage Engine explains that these programs monitor all the activities that users carry out in the cloud and, if necessary, implement security regulations, blocking actions on the user’s network that could endanger the company’s information.

Continue reading:



Source: Info Bae

Leave a Reply

Your email address will not be published. Required fields are marked *