{"id":65918,"date":"2014-09-05T08:58:17","date_gmt":"2014-09-05T13:58:17","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=65918"},"modified":"2017-04-07T20:37:09","modified_gmt":"2017-04-08T01:37:09","slug":"4-considerations-storing-data-cloud","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2014\/09\/4-considerations-storing-data-cloud\/","title":{"rendered":"4 considerations when storing data in the cloud"},"content":{"rendered":"

The hacking of celebrity accounts in late August has reminded us how vulnerable private information stored online is. This article provides some guidelines on practices that should result in safer cloud use.<\/em><\/p>\n

 <\/p>\n

Within the past week or so, various private accounts for a number of well-known celebrities were hacked and about 200 photos were posted on several public websites. One of the platforms hacked was Apple\u2019s iCloud \u2013 its cloud based service to which user data, such as passwords, files and photos are stored, and can be accessed across multiple devices.<\/p>\n

This recent incident has reignited the debate about the privacy and secureness of cloud systems, especially public clouds. However, software vendors have integrated cloud services into many of their offerings, to the point where persons are unable to use their products without establishing a cloud account. In other words, clouds are likely to remain well into the foreseeable future.<\/p>\n

Recognising that it might be futile to avoid clouds \u2013 especially when so many services use them, such as for email and social networking \u2013 to the extent that we, as users, can, a better approach might be to try to minimise breaches and the losses that can occur, should systems be compromised. Below are four things to consider when storing data in the cloud.<\/p>\n

1. Breaches are happening regularly, it may only be a matter of time before your data is affected<\/h3>\n

Without a doubt, data is the new currency of the digital age. Networks and systems worldwide are continually under attack, and even under the best of circumstances and constant vigilance, breaches occur. The majority of those incidents are not made public, but for those that have been \u2013 think Target, Sony Facebook and Yahoo, Microsoft to name a few \u2013 millions of users had been affected.<\/p>\n

In light of the regularity with which breaches are occurring, it ought to be appreciated that no network is impervious to attacks, and it may only be a matter of time before your data or your network is compromised. With that in mind, but recognising how essential cloud storage and cloud-based services have become, it might not be practical to avoid try to avoid them. Instead, the better approach might be to determine the best way to use them, whilst potentially minimising any fall out that might occur.<\/p>\n

2. A reputable provider is likely to be better resourced to address security threats<\/h3>\n

Although some businesses, particularly large corporates and enterprises might choose to build and manage their own cloud storage, this might not necessarily be an option for smaller businesses, and more so individuals. Furthermore reputable cloud services\/storage providers are more likely to be better resourced to establish the needed infrastructure and address security threats than most businesses.<\/p>\n

However, it would still be prudent to do the necessary research to learn about the policies providers have adopted, along with the systems that have been set up to store and protect users\u2019 data.<\/p>\n

3. There is still an onus on the user to implement good security practices<\/h3>\n

Having selected a reputable cloud storage provider is perhaps only 25% of the battle. Thereafter the onus is overwhelmingly on users to adopt and consistently and conscientiously apply good security practices. Many of those practices have been discussed at length in earlier articles; however, they are worth re-highlighting in summary:<\/p>\n