Attend IT Limited Blog

By accepting you will be accessing a service provided by a third-party external to

Where is Your Data and Who Can See It?

Where is Your Data and Who Can See It?

We are all in the cloud. The concept of cloud computing and cloud storage has revolutionized the way businesses handle data storage and software distribution. We have helped many of our clients utilize cloud-based services, and these days, most of us are connected to this entity labeled as “the cloud” in one way or another. The question is, how can we tell if our data is safe?

Real Quick, What’s the Cloud Again?

It’s not a dumb question, because the term “the cloud” is used synonymously for essentially any data stored on the Internet. It’s a very broad term with a lot of loose ends. Technically, Twitter and Facebook are “the cloud” and your website host is also “the cloud.” Google Drive, Dropbox, and Microsoft 365? They would also fall into this category.

If you store data on the Internet in one way or another, you are essentially in the cloud. If you want to split hairs, you can even look at having an online bank account as being in the cloud, because your personal information is stored on the bank’s online servers.

If you send digital photos to get printed at Walmart, those photos are going to Walmart’s servers and stored in, you guessed it, their online cloud. When you attach a file to an email in Gmail, that file is stored on Google’s servers in the cloud. When you ask your Amazon Echo to remind you to wake up early next week to make it to your oil change, your voice is being transferred to the cloud, and your schedule gets processed and sent to your device.

Brentford and West London businesses use the cloud for storing company data, sharing documents, or even using cloud-based apps like Office 365 to edit files from any device. Often, line of business applications will have cloud options too, so the software itself and all the data is stored offsite.

You Make It Sound Like Most of Our Data is Online… Is This Bad?

Well, depending on how you store your data, this might be the case. Whether or not it is a good thing or a bad thing depends on what your data is and where you are storing it.

Many businesses still have onsite servers where they store company data. This means the responsibility to keep those servers secure is on them. It’s no different than storing all of your vacation photos on your home computer - if something happens to your computer and the files aren’t backed up, you might be out of luck. This is why we all take precautions to secure our networks, install antivirus, set up firewalls and security devices for our businesses, backup data, etc.

The cloud is just someone else’s computer. If we store data in the cloud, we are entrusting someone else to protect it. There are pros and cons to this.

First of all, if someone is in the business of storing data online, ideally they are able to afford the best security to keep that data safe. This isn’t a guarantee, but chances are a massive company like Google or Microsoft has more capital to invest in protecting the data of their customers than a small business.

The problem is that not all cloud solutions are created equal, and they aren’t all investing the massive amounts of money needed to protect the data that they store. Plus, these solutions are bigger targets for hackers. A massive data breach at Microsoft would be a huge score for a group of hackers.

We’ve seen situations where these big cloud entities have been breached before in the past. Yahoo, Google+, Dropbox, and Apple iCloud, have all experienced different levels of security breaches, and major cybersecurity attacks happen all the time.

So Should I Pull My Business Out of the Cloud? What Should I Do?

That might feel like the best answer, but it really comes down to what you are storing and how you handle the data. Here are a few tips that will help you understand the risks and protect yourself moving forward.

Encrypt Your Data BEFORE Uploading it to the Cloud

Many cloud solutions talk about data encryption. Most public-cloud solutions, for example, say that they use 256-bit encryption. (256-bit encryption is extremely hard to crack - it’s theorized that it would take fifty supercomputers a million trillion years to crack this type of encryption). That all sounds great, right? Unfortunately, in some cases your data is only encrypted while it’s being transferred. Once the data is stored, it’s no longer encrypted.

This means, theoretically, employees at that company can potentially access your data. It also means if that company is breached, the hackers could too. If your data were encrypted and stored in an encrypted state, it doesn’t matter who accesses your data, they won’t be able to read it without being able to unlock it first.

Never Use the Same Password Twice, and Always Use Secure Passwords

This applies to anything you do online. If your passwords are different across every single online account, one data breach will hopefully not lead to more.

Understand Your Industry Compliance Regulations

Many data privacy laws and industry compliances revolve around the storage and transfer of your customer data. For example, anybody who deals with medical records needs to understand HIPAA compliance. You simply can’t transfer or store data through a third-party solution that doesn’t also strictly comply with (or exceed) your industry regulations.

Just Be Careful

Cloud storage is a huge, rapidly growing industry. It’s massively profitable and has a fairly low entry point. Plenty of up and coming services offer low-cost data storage, but they might not be doing much to protect your data. 

When in doubt, the experts at Attend IT Limited can help. Give us a call at 020 8626 4485 to talk about how to safely store and transfer files, meet industry compliance regulations, and have a healthier IT infrastructure overall.

Windows 7 Support is Coming to an End
Basic Cybersecurity Practices to Minimize Risk


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, August 05 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Cloud Best Practices Productivity Managed IT Services Privacy Disaster Recovery Hosted Solutions communications Business Backup Data Recovery Malware Data Hackers Innovation VoIP Outsourced IT Data Backup Cloud Computing IT Services Small Business Software Productivity Email IT Support Cybersecurity Efficiency Mobile Devices Business Continuity Computer IT Support Internet Upgrade Automation Internet of Things Business Management Saving Money Hardware Managed IT services Server Managed IT Phishing Information Technology Smartphone Microsoft User Tips Mobility Mobile Device Management Collaboration BDR Managed Service Provider BYOD Risk Management Budget Artificial Intelligence Windows 7 Compliance Avoiding Downtime Network Save Money Firewall Passwords Ransomware Smartphones History Cost Management Meetings Gadgets Communication Password Quick Tips Virtual Private Network Data Management Hosted Solution Covid-19 Remote Computing Spam Computers Employer-Employee Relationship Networking Document Management IT Service Recovery Paperless Office Manufacturing Content Filtering Marketing Managed Service Hard Drives Training Devices Wi-Fi Hybrid Cloud Workplace Tips VPN Solid State Drive Conferencing Remote Work Value Audit Google Business Technology Microsoft Office MSP Remote Workers Data Breach Saving Time Personal Information Automobile Data Security Printing Human Resources Windows 10 Wireless Redundancy Tech Term Android Telephone Systems Router Voiceover Internet Protocol Work/Life Balance Payroll Vulnerability Regulation Black Market Machine Learning Mobile Content Filter SaaS Managed IT Service Browser Hacking Gamification Hacker Phone System Outsource IT Bandwidth Mobile Device OneNote Voice over Internet Protocol Data Loss Data Protection End of Support Flexibility Entertainment Samsung Time Management Analysis Virtual Assistant Nanotechnology Social Engineering Application iPhone Business Telephone Office 365 Professional Services Workers Disaster Monitoring Save Time Smart Technology Windows 10 Cybercrime Azure Chromebook e-waste Fiber Optics Facebook Mobile Office Proactive HIPAA Workstations Alexa for Business Operating System Backup and Disaster Recovery Two-factor Authentication Computer Repair Lifestyle The Internet of Things Cybersecurty Travel Encryption Electronic Medical Records Printer Management Printers Project Management Students Utility Computing Advertising SMB Active Directory Virtualization Smart Tech Vendor Users Windows Server 2008 Commerce Update Development Transportation Break/Fix Window 10 Software as a Service Spyware Upgrades Legal IoT Telephony Downtime PCI DSS Financial Technology Employees Office Unified Communications Proactive IT Private Cloud Instant Messaging Windows Server Shadow IT Big Data Connectivity Employee-Employer Relationship Business Intelligence Social Media Mobile Computing Applications Administration Help Desk WPA3 Going Green Online Storage Apple Wireless Technology Antivirus Wasting Money Dark Web E-Commerce Regulations Compliance Copiers intranet Remote Monitoring Evernote Streaming Media App Wireless Internet Colocation Video Conferencing File Storage Government Customer Relationship Management User Error Money Holiday AI Computing Amazon Payment Cards Word Education Cleaning Managed Services Relocation Sabotage Sports IT budget Financial Apps Benchmarks Virtual Reality Audits Camera Edge Access Control Webinar WIndows Server 2008 Current Events Digital Signage Credit Cards Hard Drive Robot Law Enforcement eCommerce Twitter Telephone Touchscreen Windows Server 2008 R2 Smart Devices Sales Virus Unsupported Software Employee Managed Services Provider Windows Ink Device Security Worker Policy Video Games PC Cortana Blockchain Bring Your Own Device iOS Sync Text Messaging Solutions Projects WiFi Data Storage Google Docs Ciminal Memory Admin IT solutions Patch Management FAQ Music Internet Service Provider Reputation Procedure Computer Forensics Hyperlink IT Management Miscellaneous Scalability Troubleshooting Retail App store Root Cause Analysis Facebook Privacy Google Maps Battery Screen Mirroring Health Smartwatch Identities Computer Accessories Office Tips Updates Unified Threat Management Microsoft Excel Windows 10s Outlook Adobe Wireless Charging Analytics Settings YouTube Organization Gmail Wasting Time Internet Exlporer CRM Websites Company Culture Mobile Security Information Augmented Reality HaaS Point of Sale Cast Windows Server Maintenance Inventory Legislation Computer Fan Myths Tablets Microsoft Word Safety Holidays File Sharing Identity Theft Keyboard Shortcuts Hard Disk Drive Shortcut WannaCry Workstation Business Strategy Social PowerPoint Accessory Humor Keyboard Gifts Data Theft Politics Charger Net Neutrality Identity 5G Tech Support Consultant Google Drive Search Investment Communitications Comparison Language Vendor Management Threats NFL Maintenance Managing Stress Emergency Display OneDrive Storage Worker Commute Scam Excel PDF Best Practice Security Cameras Processor Licensing USB Books Telework Testing Chrome Peripheral Emails IT Solutions Alert How To Micrsosoft Experience Data Privacy Television CrashOverride Medical IT Fraud Google Assistant Co-Managed Services HBO ROI Hosted Desktop Specifications Computer Care Scams eWaste