![]() As you add data that may require more protection, re-evaluate your security settings and amp them up accordingly. In addition to staying on top of what data is where, make sure your security configurations and access rights remain consistent with the sensitivity of what you’ve stored. Many cloud services provide tools – for example, dashboards or management consoles – for just that purpose. That’s why up-to-date inventories are essential to data management. ![]() Whether you store data in the cloud, on your network, or in a file cabinet, you can’t keep data safe if you don’t know where it is. Some companies’ cloud storage resembles a forgotten attic overdue for a spring cleaning. Take regular inventories of what you keep in the cloud. You may think you’re saving steps, but it’s the business equivalent of a “Hack me!” sign.Ģ. Furthermore, never hard code passwords in cloud-based applications or source code. Require multi-factor authentication and strong passwords to protect against the risk of unauthorized access. Unless employees have a legitimate business reason, they shouldn’t have access to your cloud resources. In addition, think carefully about who at your company needs what data. Configuring your cloud security requires you to make thoughtful decisions that align with the sensitivity of the data you store and how you use it. Keep in mind that it’s not a matter of a simple on-and-off switch. But it’s up to you to understand the options and configure those settings in the way best suited to your business. Cloud providers offer detailed guidance about their security controls and how to set up their services in a more secure fashion. Take advantage of the security features offered by cloud service companies. The FTC has six tips for your business about making your use of cloud services safer – both for you and for the consumers who rely on you to safeguard their information.ġ. As cloud computing has become business as usual for many businesses, frequent news reports about data breaches and other missteps should make companies think carefully about how they secure their data. But for companies that fail to appreciate the security implications, their ethereal presence may hide dangerous storms within. ![]() At their best, they can be soothing and expansive. ![]() About the FTC Show/hide About the FTC menu itemsįor businesses, cloud services are kind of like clouds.News and Events Show/hide News and Events menu items.Advice and Guidance Show/hide Advice and Guidance menu items.Competition and Consumer Protection Guidance Documents.Enforcement Show/hide Enforcement menu items. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |