8. Some is important but needed
infrequently, and some must be
immediately accessible.
9. Profiling and
classifying your
data will help you
make the right
decisions about
the type of cloud
implementation
that best suits your
needs and the
levels of protection
various data sets
are worthy of.
10. For our purposes here, we’ll be talking
about best practices for protecting
important corporate data assets,
whatever they might be…
12. Use a Unique
Password
Use different usernames and
passwords for every site and online
service, using combinations of letters,
numbers and symbols to make
passwords tough.
13. Encrypt Your Data.
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
14. Encrypt Your Data.
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
Always keep your
computer clean and
free from viruses
and malware by
using reliable and
updated antivirus
software.
Use Security Software
15. Logging in with two-factor authentication requires both
username and password, as well as a unique code sent to
a device or more sophisticated methods such as fingerprint
or iris scans.
Use Two-factor
Authentication.
16. If You Need It, Back It Up
Know your data so that you can encrypt it appropriately,
focusing first on data subject to compliance and regulation.
17. Un-store
Obsolete
Data.
By regulation, some data
have very long shelf lives,
but a hefty portion can be
expunged if properly
managed; the less data
you keep, the less your
exposure is to loss or
theft.
18. Know Your Provider
Minimizing risk to its
lowest level helps
maximize the
benefits of cloud
storage; demand
that your provider
explains and proves
how it does that.
19. Know Where Your Data Lives
Data that’s subject
to jurisdictional
restrictions by state
or by country must
be stored in U.S.
facilities and on
hardware that is
readily identifiable.
20. The Infrastructure Behind
the Claims
Asking who the CSP’s
technology providers are,
as well as what its internal
auditing and system
maintenance policies are,
will tell you a great deal
about the robustness of its
infrastructure.
.
Asking who the CSP’s
technology providers
are, as well as what its
internal auditing and
system maintenance
policies are, will tell
you a great deal about
the robustness of its
infrastructure.
The
Infrastructure
Behind
The Claims
21. Whether a CSP’s advanced services
are part of the initial engagement or
not, knowing they are available as
your needs change and grow is good
insurance.
Think About the Future
22. Please be sure to
check out our video
on compliance
Click to View
Contact our solutions
engineer today
866-473-2510
Chat Now