Here is a list of programs and services you probably didn’t realize are all cloud computing services:
- Google Mail (gMail)
- Yahoo Mail
- Microsoft Office 365
- Amazon CloudDrive
- Microsoft OneDrive
- Google Apps
- Cisco WebEx
These are all cloud computing. In every case, the data you are viewing on your computer screen is on a server computer located somewhere on the internet. The data is not on your local computer or network. All of these services and more keep data on their servers for you to store, use, and view.
If you don’t use cloud computing you have different security issues than if you do use it. All computers and networks should be equipped with software and hardware firewalls, anti-malware software – antivirus, antispyware, antirootkit, etc., a good password set up, and so forth. More is here: How safe is your data in the cloud – tips to keep it safe.
Cloud computing has many benefits discussed here: Cloud computing lets your business interact more with your customers and here: what are the various cloud computing models – which is best for your business.
There are several security issues to be considered when using cloud computing. Most are common to non-cloud computing networks. Protecting your data is paramount.
Issues include unauthorized access and related password issues and data loss. With unauthorized access, data can be stolen, passwords can be used to access bank accounts. Confidential records can be accessed.
Sometimes the way multiple programs and cloud sites are connected to automate tasks can create more vulnerability. If the connections are not set up properly, a problem on one can affect connected accounts and data. For example, many programs can be set up to automatically save data to Dropbox. If a program connected to Dropbox gets compromised, everything in Dropbox could be accessible.
Precautions are necessary for safe cloud computing. Many of these are necessary for a safe network even without cloud computing. The ones that are useful in both instances are marked with an asterisk – *.
The interconnections of various apps should be audited regularly* so any vulnerabilities can be addressed.
Strong and varied passwords*. More detail is here: How to come up with effective passwords and what can happen to your network if you don’t.
Training of personnel to avoid social engineering* such as phishing discussed here: Why is phishing spelled that way and what is it?
Let Myers Network Solutions install the best anti-hacking solutions on your network*.
Keep passwords and access authorizations current*. Make sure access to sensitive data is allowed for only people who truly need it. Job duties sometimes change. Employees leave and are replaced.
Let Myers set up your network for automated continual back-up*. Having am up-to-the-minute backup as well as other slightly older backups protects you even if the worst happens. Data can be restored quickly.
If your business network has WiFi, security is sometimes overlooked. Having good security features enabled there greatly reduces vulnerability.
Further, if anybody is logging in to your network from the field and is using a public WiFi spot, that can make your network substantially more vulnerable unless good practices are followed. This is also true if they are logging in from home.
Myers Network Solutions is expert at protecting your network from vulnerabilities. We protect your data and your business.