Computing analyst details cloud security tactics
Phil Wainewright recently wrote an article for ZDNet urging people deploying the cloud to follow critical security guidelines.
However, most of the tactics highlighted by Wainewright did not involve advanced security measures or sophisticated programming. Instead, he chose to focus on password authentication procedures, such as strong phrases to guard email inboxes, multiple login details and disaster plans in the event that a cloud service is hacked by cyber criminals.
Furthermore, he also claimed that password reset protocols were as important as the original login details themselves, as people often make these authentication processes rather simple. Wainewright likens this practice to leaving the house key underneath the doormat on the front porch to highlight the avenue's potential for data breaches. Therefore, cloud users should make their password recovery details unique and multifaceted to better protect their virtual information.
Users with concise cloud protection services in place may also find their business operations streamlined by the platform, reported PC World. Accordingly, functions such as file syncing may better organize data that is accessed through multiple remote portals.
|