Preventing Cyber Security Risks in the Cloud
San Diego, USA (PRWEB) September 28, 2013 -- But the use of a few security tactics can go a long way toward making the cloud a safe place to share valuable information, applications, and resources. Yury Borukh, CEO of ITatOnce, a leading San Diego area technology company, outlined some simple tactics to combat security threats associated with a cloud-based infrastructure.
1. Private Clouds Safer than Public Clouds
A survey published in this summer on a technology news and reviews website projected that private clouds will grow at a rate twice that of public clouds in the coming 12 months. “One of the reasons for this tremendous growth is the additional security advantages of private clouds over public clouds,” explained Borukh.
Companies using their own private cloud or the services of a trusted third party can limit data access through powerful barriers. Information and applications remain safe within these organizational boundaries.
2. Unfathomable Passwords
“One of the easiest ways to prevent access to information in the cloud is by using passwords that are nearly impossible to guess, even with passwords-detection software,” said Borukh. He further advises that cloud users change their passwords frequently and avoid reusing the same ones.
Some other tips, based on information published by Microsoft, include ensuring that a password:
• Is at least eight characters long.
• Avoids your user name, real name, or company name.
• Does not contain a complete word.
• Contains capital and lower case letters, as well as numbers and keyboard symbols.
3. Keep a Cloud Backup
Backing up data in the cloud is an easy way to help keep information secure. “That way, even if an intrusion threatens data and applications, you are able to recover your information,” Borukh pointed out.
4. Keep Data Transfer Channels Secure
Use strong encryption codes for critical data transfer over the cloud. All the data you share between your network and the cloud-service must go through the Internet, which makes it particularly vulnerable to interception. “It becomes critical that companies use only the most secure channels, and encrypt data whenever necessary,” Borukh advised.
5. Use Reliable Software Interfaces
The application programming interfaces (APIs) used to access software applications on the cloud need to be highly secured. “APIs that are less than secure open you to serious security threats,” noted Borukh. “Know your APIs well before starting to use them as a window to access cloud applications.”
Contact ITatOnce if you are interested in learning more about how your organization can establish secure cloud computing practices.
Yury Borukh, CEO
ITatOnce
(858) 733 1012
ylb(at)itatonce(dot)com
Mehul Bhuva, Dev IT Solutions Pvt Ltd, http://www.devitsolutions.com, +919909007119, [email protected]
Share this article