10 ways to protect data in the cloud

Download 10 Ways to Protect Data in the Cloud

Post on 15-Jan-2015

330 views

Category:

Technology

1 download

Embed Size (px)

DESCRIPTION

Protecting your data in the cloud requires that you first answer these questions: What is “your data?” Where is it and who is using your data?

TRANSCRIPT

  • 1. 10 Ways to Protect Your Data in the Cloud

2. Protecting your data in the cloud requires that you first answer these questions: What is your data? Where is it? Who is using it? 3. This is not as simple as it sounds. Data is likely scattered throughout your organization. ? ?? ? ? ? 4. All data is important (or once was) but not equally. Your business cannot function without some of it. 5. Some is important but needed infrequently, and some must be immediately accessible. 6. Other data in the hands of hackers could cause big problems. 7. Still other data should have been erased long ago. 8. Some is important but needed infrequently, and some must be immediately accessible. 9. Profiling and classifying your data will help you make the right decisions about the type of cloud implementation that best suits your needs and the levels of protection various data sets are worthy of. 10. For our purposes here, well be talking about best practices for protecting important corporate data assets, whatever they might be 11. .personally identifiable information, intellectual property, market strategies, trade secrets, material financial information or product production data. 12. Use a Unique Password Use different usernames and passwords for every site and online service, using combinations of letters, numbers and symbols to make passwords tough. 13. Encrypt Your Data. Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation. 14. Encrypt Your Data. Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation. Always keep your computer clean and free from viruses and malware by using reliable and updated antivirus software. Use Security Software 15. Logging in with two-factor authentication requires both username and password, as well as a unique code sent to a device or more sophisticated methods such as fingerprint or iris scans. Use Two-factor Authentication. 16. If You Need It, Back It Up Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation. 17. Un-store Obsolete Data. By regulation, some data have very long shelf lives, but a hefty portion can be expunged if properly managed; the less data you keep, the less your exposure is to loss or theft. 18. Know Your Provider Minimizing risk to its lowest level helps maximize the benefits of cloud storage; demand that your provider explains and proves how it does that. 19. Know Where Your Data Lives Data thats subject to jurisdictional restrictions by state or by country must be stored in U.S. facilities and on hardware that is readily identifiable. 20. The Infrastructure Behind the Claims Asking who the CSPs technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure. . Asking who the CSPs technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure. The Infrastructure Behind The Claims 21. Whether a CSPs advanced services are part of the initial engagement or not, knowing they are available as your needs change and grow is good insurance. Think About the Future 22. Please be sure to check out our video on compliance Click to View Contact our solutions engineer today 866-473-2510 Chat Now

Recommended

View more >