{"id":793,"date":"2023-06-19T14:23:22","date_gmt":"2023-06-19T06:23:22","guid":{"rendered":"https:\/\/www.info-trek.com\/blog\/?p=793"},"modified":"2024-05-02T12:10:40","modified_gmt":"2024-05-02T04:10:40","slug":"cloud-security-how-to-keep-yourself-safe","status":"publish","type":"post","link":"https:\/\/www.info-trek.com\/blog\/cloud-security-how-to-keep-yourself-safe\/","title":{"rendered":"Cloud Security \u2013 How To Keep Yourself Safe"},"content":{"rendered":"\n<p>Often time I have myself thinking, \u201cis it safe to keep my things on the cloud storage?\u201d I mean come to think of it, there are many famous cases where cloud storage services get hacked and things get leaked publicly. But again, come to think of it, in such a connected world that everyone is heavily promoting, keeping it on your physical storage or your cloud storage doesn\u2019t differ much. Spending nearly a day to think of this scares me. So, I have decided to do my research on how to make sure I am safe myself on the cloud. What I am about to share applied not just for cloud storage, it can be used for any cloud services. And, what I am suggesting applies for Personal and enterprise.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Methods to keep yourself safe on the cloud<\/h1>\n\n\n\n<h2 class=\"wp-block-heading\">Password<\/h2>\n\n\n\n<p>Having a strong password is the first step of keeping yourself safe on the cloud. It\u2019s like a house if you don\u2019t even install a good lock for your house, how do you expect people not breaking into your house?\u00a0Setting a password is not as difficult\u00a0as you might think, and there is a lot of password manager available on the market that will help you safely keep those passwords. It is advisable to have a different password for a different platform, or else you might risk yourself getting hack at every account when one of your platforms is compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Using YubiKey<\/h2>\n\n\n\n<p>Very interesting hardware that I found during my research.&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=mqrclOOgzcY\">YubiKey<\/a>&nbsp;is a USB<\/p>\n\n\n\n<p>that act as two-factor authentication, where users need to plug this into the USB slot of the device they want to access the cloud (or anything else the user wants to add in extra security) before they can access the content inside. It\u2019s like the combination of hardware and software security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Know your cloud<\/h2>\n\n\n\n<p>Many enterprises engage with a third-party cloud service provider to provide the cloud service. Before everything, it is crucial for both parties to understand and agreed that cloud security is the responsibilities of both parties. Let\u2019s be honest, with such pace of advancement nowadays, it seems unrealistic to think that security can only depend on one party. So, this needs to get out of the way first before anything else.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cloud data deleting policies<\/h2>\n\n\n\n<p>It happens, when one service provider is not working up to our expectation, we switch to another one. It\u2019s totally fine and common, but one thing to keep in mind, and yes, before anything else, is to identify the data deletion policies. It\u2019s simple, I am sure you do not want your old provider keeping your information even after you stop engaging their service, right?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Pentest, frequently<\/h2>\n\n\n\n<p>It is no sure-fire way when it comes to security. So, the simplest way to make sure your cloud is safe is by hacking it, yourself. Penetration testing (Pentest) is what people call this process. There are few ways to do that, one is by employing a third party to do it, or having your own people to do it. Depends on the size of the company, it is advisable to conduct Pentest frequently as things are changing relatively fast nowadays.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Habit and Culture<\/h2>\n\n\n\n<p>What\u2019s the point of all this, if we humans don\u2019t take any precaution when handling the cloud? It all comes back to the habit and culture when it comes to cybersecurity as a whole. Therefore, if it is for your own personal cloud service, try to practice good cybersecurity habit, and if it is for your company, build the culture and make sure your people have a good cybersecurity habit as well. Social engineering, phishing can do way more damage than hacker trying to hack your cloud or device.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Final verdict<\/h1>\n\n\n\n<p>Cloud security, cybersecurity, regardless of which one is it that you are focusing, getting the habit and culture right is the critical part. Of course, infrastructure is important too, but those can be easily acquired. If you are running a company where all your information is stored in the cloud, it is advisable to get your people\u00a0aware of the importance of cybersecurity. After all, any system can be hacked, all it requires is only a single click.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Often time I have myself thinking, \u201cis it safe to keep my things on the cloud storage?\u201d I mean come to think of it, there are many famous cases where cloud storage services get hacked and things get leaked publicly. But again, come to think of it, in such a connected world that everyone is [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":704,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/comments?post=793"}],"version-history":[{"count":2,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/793\/revisions"}],"predecessor-version":[{"id":1859,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/posts\/793\/revisions\/1859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media\/704"}],"wp:attachment":[{"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/media?parent=793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/categories?post=793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.info-trek.com\/blog\/wp-json\/wp\/v2\/tags?post=793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}