Pages Menu
Categories Menu

Posted by on Aug 7, 2012 in Internet |

5 tips to protect our data in the cloud

5 tips to protect our data in the cloud

(Cc) RaeAllen

This weekend, the Wired journalist, Mat Honan, lost all the on your iPhone, iPhone and MacBook because someone gained access to your icloud account and deleted all the contents of remote devices. This is a case that again drew attention to security in the cloud, and the dangers.

The same Steve Wozniak said he “sucks” because you do not own anything that is in the cloud. And while the online backup is comfortable and practical, we must not lose sight of these points.

While the attack on Honan was quite unusual – included social engineering service by calling Apple Support – it is worth reviewing our practice in the cloud. What can you do to minimize the risks? Here are some ideas.

Make backups

Making backups is boring and many people rely on the for this, synchronizing your computer or mobile phone with the cloud and trusting that this will be enough to have the Data in a safe place. The issue of is new, but people already lost information MegaUpload closed by the FBI to use this service as a backup . Always worth having a physical alternative to important material – papers, photos, etc.. It may be an external hard drive or SD memory for mobile phones. And if you do backups in the cloud, perhaps it is a good idea to have a backup of the backup in another service.

Double Authentication

Several services deliver an option to do a second check identity when entering the account or when you make configuration changes (such as resetting the password). This alternative enhances safety by adding “reliable machines,” recording for example PCs from which you usually connect, or requesting your phone number via text message confirming the changes.

Use a different service to remotely wipe

The service Find My iPhone to erase all of the devices remotely as a safety measure in case you steal the computer. Included in icloud and that makes it comfortable to use, however, if someone gains access to the system can use it to attack the user. In Sophos suggest that a good alternative is to use a separate Security service to remote eliminations, which does not come from those who sold you the product.

If that’s a lot of work, at least you must be a good time to setup the “Find My iPhone” and “Find My Mac.” A computer that is probably not need to be fixed within this program because it is less likely to be lost or stolen from the desktop, while it could be more useful on computers that you use to travel or who are at higher risk of being lost.

No link accounts

Matching email accounts, Twitter or Facebook makes the attackers have more options to access other services you use on the web. For Honan, hackers could enter Gizmodo Twitter because he worked there before and was related to his personal account.

In the case of email, accounting separation is healthier because it reduces the likelihood of inappropriate or send an email by mistake from the account of work, while making it harder for an attacker to get all the information.

Encrypt all

Encryption may sound extreme, but if someone gets access to your information on the web, is the best way to prevent them read what is there or use it for something. You can use your own encryption key instead of relying on what they offer in the cloud platforms, making it more secure of data.

Bonus: Passwords!

It may seem obvious but a basic part of the security of any web service is to have good passwords, and not repeat them for the different services you use on the web. Nor is it a good idea that many people know your password – family, friends, colleagues – because they are more likely to lose it. For a super-secure password, you can follow these tips .

Tags: , , , , , , ,