SlideShare a Scribd company logo
1 of 22
10 Ways to
Protect Your
Data in
the Cloud
Protecting your data in the
cloud requires that you first
answer these questions:
What is your data?
Where is it?
Who is using it?
This is not as simple as it sounds.
Data is likely scattered throughout
your organization.
?
??
? ?
?
All data is important (or once was)
but not equally. Your business
cannot function without some of it.
Some is important but needed
infrequently, and some must be
immediately accessible.
Other data ─ in the
hands of hackers ─ could
cause big problems.
Still other data should have
been erased long ago.
Some is important but needed
infrequently, and some must be
immediately accessible.
Profiling and
classifying your
data will help you
make the right
decisions about
the type of cloud
implementation
that best suits your
needs and the
levels of protection
various data sets
are worthy of.
For our purposes here, we’ll be talking
about best practices for protecting
important corporate data assets,
whatever they might be…
….personally identifiable information,
intellectual property, market strategies,
trade secrets, material financial
information or product production data.
Use a Unique
Password
Use different usernames and
passwords for every site and online
service, using combinations of letters,
numbers and symbols to make
passwords tough.
Encrypt Your Data.
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
Encrypt Your Data.
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
Always keep your
computer clean and
free from viruses
and malware by
using reliable and
updated antivirus
software.
Use Security Software
Logging in with two-factor authentication requires both
username and password, as well as a unique code sent to
a device or more sophisticated methods such as fingerprint
or iris scans.
Use Two-factor
Authentication.
If You Need It, Back It Up
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
Un-store
Obsolete
Data.
By regulation, some data
have very long shelf lives,
but a hefty portion can be
expunged if properly
managed; the less data
you keep, the less your
exposure is to loss or
theft.
Know Your Provider
Minimizing risk to its
lowest level helps
maximize the
benefits of cloud
storage; demand
that your provider
explains and proves
how it does that.
Know Where Your Data Lives
Data that’s subject
to jurisdictional
restrictions by state
or by country must
be stored in U.S.
facilities and on
hardware that is
readily identifiable.
The Infrastructure Behind
the Claims
Asking who the CSP’s
technology providers are,
as well as what its internal
auditing and system
maintenance policies are,
will tell you a great deal
about the robustness of its
infrastructure.
.
Asking who the CSP’s
technology providers
are, as well as what its
internal auditing and
system maintenance
policies are, will tell
you a great deal about
the robustness of its
infrastructure.
The
Infrastructure
Behind
The Claims
Whether a CSP’s advanced services
are part of the initial engagement or
not, knowing they are available as
your needs change and grow is good
insurance.
Think About the Future
Please be sure to
check out our video
on compliance
Click to View
Contact our solutions
engineer today
866-473-2510
Chat Now

More Related Content

More from Peak 10

10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
Peak 10
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
Peak 10
 

More from Peak 10 (17)

Advantages of Converged Infrastructures
Advantages of Converged InfrastructuresAdvantages of Converged Infrastructures
Advantages of Converged Infrastructures
 
New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10New Tampa Data Center - Peak 10
New Tampa Data Center - Peak 10
 
Cloud Migration
Cloud Migration Cloud Migration
Cloud Migration
 
Buyers Guide To Cloud
Buyers Guide To CloudBuyers Guide To Cloud
Buyers Guide To Cloud
 
Governance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT LeadersGovernance Tips for Midmarket IT Leaders
Governance Tips for Midmarket IT Leaders
 
Tips for Securing ePHI in the Cloud
Tips for Securing ePHI in the CloudTips for Securing ePHI in the Cloud
Tips for Securing ePHI in the Cloud
 
Top 10 Reasons for Colocation
Top 10 Reasons for ColocationTop 10 Reasons for Colocation
Top 10 Reasons for Colocation
 
Tips For Being Compliance Ready
Tips For Being Compliance ReadyTips For Being Compliance Ready
Tips For Being Compliance Ready
 
Security Hurts Business - Don't Let It
Security Hurts Business - Don't Let ItSecurity Hurts Business - Don't Let It
Security Hurts Business - Don't Let It
 
How to solve your IT problems in 7 days
How to solve your IT problems in 7 daysHow to solve your IT problems in 7 days
How to solve your IT problems in 7 days
 
The Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a ServiceThe Whats, Whys and Hows of Database as a Service
The Whats, Whys and Hows of Database as a Service
 
13 Tips for Cloud Security
13 Tips for Cloud Security13 Tips for Cloud Security
13 Tips for Cloud Security
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
10 Tech Trends for 2014
10 Tech Trends for 201410 Tech Trends for 2014
10 Tech Trends for 2014
 
Five Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration MethodsFive Workload-to-Cloud Migration Methods
Five Workload-to-Cloud Migration Methods
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
CIO: Your Survival Guide
CIO: Your Survival GuideCIO: Your Survival Guide
CIO: Your Survival Guide
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

10 Ways to Protect Data in the Cloud

  • 1. 10 Ways to Protect Your Data in the Cloud
  • 2. Protecting your data in the cloud requires that you first answer these questions: What is your data? Where is it? Who is using it?
  • 3. This is not as simple as it sounds. Data is likely scattered throughout your organization. ? ?? ? ? ?
  • 4. All data is important (or once was) but not equally. Your business cannot function without some of it.
  • 5. Some is important but needed infrequently, and some must be immediately accessible.
  • 6. Other data ─ in the hands of hackers ─ could cause big problems.
  • 7. Still other data should have been erased long ago.
  • 8. Some is important but needed infrequently, and some must be immediately accessible.
  • 9. Profiling and classifying your data will help you make the right decisions about the type of cloud implementation that best suits your needs and the levels of protection various data sets are worthy of.
  • 10. For our purposes here, we’ll be talking about best practices for protecting important corporate data assets, whatever they might be…
  • 11. ….personally identifiable information, intellectual property, market strategies, trade secrets, material financial information or product production data.
  • 12. Use a Unique Password Use different usernames and passwords for every site and online service, using combinations of letters, numbers and symbols to make passwords tough.
  • 13. Encrypt Your Data. Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation.
  • 14. Encrypt Your Data. Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation. Always keep your computer clean and free from viruses and malware by using reliable and updated antivirus software. Use Security Software
  • 15. Logging in with two-factor authentication requires both username and password, as well as a unique code sent to a device or more sophisticated methods such as fingerprint or iris scans. Use Two-factor Authentication.
  • 16. If You Need It, Back It Up Know your data so that you can encrypt it appropriately, focusing first on data subject to compliance and regulation.
  • 17. Un-store Obsolete Data. By regulation, some data have very long shelf lives, but a hefty portion can be expunged if properly managed; the less data you keep, the less your exposure is to loss or theft.
  • 18. Know Your Provider Minimizing risk to its lowest level helps maximize the benefits of cloud storage; demand that your provider explains and proves how it does that.
  • 19. Know Where Your Data Lives Data that’s subject to jurisdictional restrictions by state or by country must be stored in U.S. facilities and on hardware that is readily identifiable.
  • 20. The Infrastructure Behind the Claims Asking who the CSP’s technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure. . Asking who the CSP’s technology providers are, as well as what its internal auditing and system maintenance policies are, will tell you a great deal about the robustness of its infrastructure. The Infrastructure Behind The Claims
  • 21. Whether a CSP’s advanced services are part of the initial engagement or not, knowing they are available as your needs change and grow is good insurance. Think About the Future
  • 22. Please be sure to check out our video on compliance Click to View Contact our solutions engineer today 866-473-2510 Chat Now