Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Where is Your Data and Who Can See It?

Where is Your Data and Who Can See It?

We are all in the cloud. The concept of cloud computing and cloud storage has revolutionized the way businesses handle data storage and software distribution. We have helped many of our clients utilize cloud-based services, and these days, most of us are connected to this entity labeled as “the cloud” in one way or another. The question is, how can we tell if our data is safe?

Real Quick, What’s the Cloud Again?

It’s not a dumb question, because the term “the cloud” is used synonymously for essentially any data stored on the Internet. It’s a very broad term with a lot of loose ends. Technically, Twitter and Facebook are “the cloud” and your website host is also “the cloud.” Google Drive, Dropbox, and Microsoft 365? They would also fall into this category.

If you store data on the Internet in one way or another, you are essentially in the cloud. If you want to split hairs, you can even look at having an online bank account as being in the cloud, because your personal information is stored on the bank’s online servers.

If you send digital photos to get printed at Walmart, those photos are going to Walmart’s servers and stored in, you guessed it, their online cloud. When you attach a file to an email in Gmail, that file is stored on Google’s servers in the cloud. When you ask your Amazon Echo to remind you to wake up early next week to make it to your oil change, your voice is being transferred to the cloud, and your schedule gets processed and sent to your device.

Brentford and West London businesses use the cloud for storing company data, sharing documents, or even using cloud-based apps like Office 365 to edit files from any device. Often, line of business applications will have cloud options too, so the software itself and all the data is stored offsite.

You Make It Sound Like Most of Our Data is Online… Is This Bad?

Well, depending on how you store your data, this might be the case. Whether or not it is a good thing or a bad thing depends on what your data is and where you are storing it.

Many businesses still have onsite servers where they store company data. This means the responsibility to keep those servers secure is on them. It’s no different than storing all of your vacation photos on your home computer - if something happens to your computer and the files aren’t backed up, you might be out of luck. This is why we all take precautions to secure our networks, install antivirus, set up firewalls and security devices for our businesses, backup data, etc.

The cloud is just someone else’s computer. If we store data in the cloud, we are entrusting someone else to protect it. There are pros and cons to this.

First of all, if someone is in the business of storing data online, ideally they are able to afford the best security to keep that data safe. This isn’t a guarantee, but chances are a massive company like Google or Microsoft has more capital to invest in protecting the data of their customers than a small business.

The problem is that not all cloud solutions are created equal, and they aren’t all investing the massive amounts of money needed to protect the data that they store. Plus, these solutions are bigger targets for hackers. A massive data breach at Microsoft would be a huge score for a group of hackers.

We’ve seen situations where these big cloud entities have been breached before in the past. Yahoo, Google+, Dropbox, and Apple iCloud, have all experienced different levels of security breaches, and major cybersecurity attacks happen all the time.

So Should I Pull My Business Out of the Cloud? What Should I Do?

That might feel like the best answer, but it really comes down to what you are storing and how you handle the data. Here are a few tips that will help you understand the risks and protect yourself moving forward.

Encrypt Your Data BEFORE Uploading it to the Cloud

Many cloud solutions talk about data encryption. Most public-cloud solutions, for example, say that they use 256-bit encryption. (256-bit encryption is extremely hard to crack - it’s theorized that it would take fifty supercomputers a million trillion years to crack this type of encryption). That all sounds great, right? Unfortunately, in some cases your data is only encrypted while it’s being transferred. Once the data is stored, it’s no longer encrypted.

This means, theoretically, employees at that company can potentially access your data. It also means if that company is breached, the hackers could too. If your data were encrypted and stored in an encrypted state, it doesn’t matter who accesses your data, they won’t be able to read it without being able to unlock it first.

Never Use the Same Password Twice, and Always Use Secure Passwords

This applies to anything you do online. If your passwords are different across every single online account, one data breach will hopefully not lead to more.

Understand Your Industry Compliance Regulations

Many data privacy laws and industry compliances revolve around the storage and transfer of your customer data. For example, anybody who deals with medical records needs to understand HIPAA compliance. You simply can’t transfer or store data through a third-party solution that doesn’t also strictly comply with (or exceed) your industry regulations.

Just Be Careful

Cloud storage is a huge, rapidly growing industry. It’s massively profitable and has a fairly low entry point. Plenty of up and coming services offer low-cost data storage, but they might not be doing much to protect your data. 

When in doubt, the experts at Attend IT Limited can help. Give us a call at 020 8626 4485 to talk about how to safely store and transfer files, meet industry compliance regulations, and have a healthier IT infrastructure overall.

Windows 7 Support is Coming to an End
Basic Cybersecurity Practices to Minimize Risk
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Productivity Network Security Cloud Best Practices Tip of the Week Business Managed IT Services Data Data Backup Data Recovery Hackers IT Services IT Support Innovation communications Hosted Solutions Disaster Recovery Software Backup Privacy VoIP Cybersecurity Malware Mobile Devices Small Business Efficiency Internet Saving Money Email Business Continuity Computer Cloud Computing Phishing Collaboration Hardware Business Management Outsourced IT Microsoft BDR Automation Information Technology User Tips Ransomware Productivity Smartphones IT Support Compliance Internet of Things Users Workplace Tips Workplace Strategy Quick Tips Smartphone Server Artificial Intelligence Communication Upgrade Risk Management Wi-Fi Mobile Device Management Network Managed IT Mobility Managed IT services Budget Training Spam Meetings Employee-Employer Relationship Covid-19 Gadgets Passwords BYOD Managed Service Provider Google Save Money Wireless Password Mobile Device Networking Human Resources Remote Avoiding Downtime Document Management Android Printing Information Windows 7 Remote Workers Social Media Microsoft Office VPN Remote Computing Chrome History Hosted Solution Router Instant Messaging Firewall Content Filtering Computers Data Management Cost Management Windows 10 Project Management MSP Monitoring Managed Service Virtual Private Network Help Desk Time Management Remote Work Video Conferencing Laptop Marketing Recovery Telephone Systems Government End of Support Hacker Personal Information Hard Drives Solid State Drive Current Events Encryption Battery Automobile Telephony Big Data Two-factor Authentication Audit Office Employer-Employee Relationship Value Saving Time Data Breach Data Storage Data Security Mobile Software as a Service Conferencing Redundancy Maintenance Devices Tech Term Proactive Computing Wireless Internet Hybrid Cloud Business Technology Printers IT Service Machine Learning Paperless Office Backup and Disaster Recovery Voice over Internet Protocol Mobile Office Manufacturing Customer Relationship Management AI Printer Managed Services Mobile Computing Proactive IT Social Engineering Transportation Going Green Browser Applications Private Cloud Operating System iPhone Health Windows Money Facebook Administration Colocation Windows 10 Advertising PDF Apps Legal Wireless Technology Flexibility Update Cybercrime Black Market Virtualization Shadow IT Disaster Education Application Save Time Work/Life Balance Office 365 Antivirus Holiday Entertainment HIPAA Phone System Analytics Electronic Medical Records Cleaning Hacking Smart Technology Vendor Management Samsung Company Culture App SaaS Upgrades Vulnerability The Internet of Things Dark Web Nanotechnology OneNote Business Intelligence Managed IT Service Data Protection Commerce Regulation Professional Services Travel Word Apple User Error Data Loss File Sharing Storage Lifestyle Evernote Workers Spyware intranet Blockchain IoT Analysis Chromebook Smart Tech Connectivity Streaming Media Content Filter Management Financial Technology Gamification Students Unified Communications Remote Monitoring Wasting Money Amazon Virtual Assistant Alexa for Business WPA3 File Storage Bandwidth Vendor Telephone Utility Computing Payroll SMB Downtime E-Commerce Payment Cards Break/Fix e-waste Employees Smartwatch Development Azure Active Directory Windows Server Cybersecurty Window 10 Online Storage Fiber Optics Windows Server 2008 Copiers Voiceover Internet Protocol Business Telephone Computer Repair Troubleshooting CRM Workstations Outsource IT PCI DSS Regulations Compliance Cost Remote Working Leadership Bitcoin Finance Infrastructure Videoconferencing Streaming Customer Service Copier Authentication Hiring/Firing RMM Windows 11 Cabling Going Paperless Inventory Management Employer/Employee Relationships Outsourcing How To Microsoft Outlook Files Regulations Paperless Solutions Microsoft 365 Strategy Consulting Decision Making Ergonomics Signage Customer Experience Robot Google Drive Miscellaneous Alert Law Enforcement Reputation Social Relocation Search Internet Exlporer Text Messaging Office Tips HaaS Video Games Scalability Humor How To Best Practice USB Virtual Reality Managing Stress Point of Sale Identity Theft Worker Commute Politics Experience Music Books Safety Emergency Worker Scam Computer Accessories Charger Computer Care Unsupported Software Television Business Strategy WiFi Unified Threat Management Consultant Touchscreen Emails Webinar IT solutions Windows 10s Hard Disk Drive iOS Computer Fan Root Cause Analysis Augmented Reality CrashOverride Settings Screen Mirroring Cast HBO IT Management IT Solutions WIndows Server 2008 Patch Management Outlook Shortcut Excel Sync Adobe Licensing Tablets NFL Windows Ink Google Maps Google Docs Microsoft Excel Sports Cortana Legislation Comparison Specifications Sales Retail Gifts Credit Cards FAQ Wireless Charging WannaCry Updates Microsoft Word eWaste Device Security Tech Support Fraud Edge Ciminal IT budget Identities Language Virus Websites Data Theft App store Mobile Security Identity Data Privacy Hard Drive Google Assistant Twitter Computer Forensics Gmail PowerPoint Memory Financial Bring Your Own Device Testing Camera Projects Display Co-Managed Services Hyperlink Wasting Time Accessory Peripheral Access Control Admin Keyboard Shortcuts Security Cameras Employee 5G Medical IT YouTube OneDrive Sabotage PC Server Maintenance Investment ROI Windows Server 2008 R2 Micrsosoft Digital Signage Processor Benchmarks Myths Threats Scams Managed Services Provider Facebook Privacy eCommerce Holidays Inventory Communitications Hosted Desktop Smart Devices Keyboard Net Neutrality Internet Service Provider Workstation Telework Audits Solutions Policy Procedure Organization Innovations Reviews Biometrics Computer Tips Work Windows 8.1 Voice Supply Chain Environment Workplace Strategies Print Management Healthcare SSD Remote Management Telephone System Print Database 2FA Virtual Desktop Proactive Management eSignature Cyberattack Cameras Digital Cameras Mixed Reality Displays