When it comes to cloud security, users are often concerned about where cloud data is located and how secure that location is. At TelWare, we understand that users are often concerned about the security of their data storage systems and are always looking for ways to protect against unwanted access. We've put together some cloud security fundamentals to ensure your accounts and personal information are protected.
Cloud Security Checklist
- What am I doing to secure my data?
- Am I using strong passwords?
- Am I using different passwords for different services?
- Is the device that I use to access my data secure, updated and protected?
- Is the internet connection I’m using secure?
First thing's first: create strong passwords. It's important to remember, however, that even strong passwords can be guessed, cracked, hacked or stolen. This can lead to unwanted access to your accounts (regardless of location). If you use the same password for multiple services, this can create a domino effect, allowing hackers to gain access to other accounts and all of your personal information.
2-step verification is the idea is that you use a password plus something else to secure access to your account (and your data). This is not necessarily a new idea. Banks have been doing this a long time (mother’s maiden name, PIN, etc.). You can now enable two-step verification for some cloud services. What makes this unique is that these use your phone (app, SMS or voice call), but some use more complex methods like printable matrix grids to reference.
- Enable 2-step verification for Google
- Enable 2-step verification for Apple
- Enable 2-step verification for Microsoft
- Enable 2-step verification for PayPal
Having unique passwords for different sites (and changing them regularly) can be a challenge. There are several solutions out there to help with this, like LastPass. It will save your password in real-time and enter it for you on most major websites that you have saved. Make sure you enable two-step verification!
Be sure to secure your devices and internet connections. Make sure you apply the most recent updates and patches and use anti-virus software. Set operating systems and devices to automatically update, enable firewalls and disable sharing. Also secure network routers that you own and use a secure internet browser like Google Chrome or Mozilla Firefox.
You should take advantage of every opportunity to secure your data. For more information about cloud computing and how to protect your data, contact TelWare at 1-800-637-3148 or email us at firstname.lastname@example.org. We look forward to helping your company grow and take full advantage of the technological advances in unified business communications.