SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Security in
the Cloud
Tips on How to
Protect Your Data
The concept of the cloud can still be difficult for many to
grasp. The name itself conjures up visions of important
and private data floating around in the ether which doesn’t
evoke a strong sense of security. However, cloud storage is
much safer and more secure than many on-site servers and
hard drives.
2
What is the Cloud?
It may sound like just one more
buzzword that will soon pass but,
in reality, the concept of cloud
computing has been around for
decades. It’s hard to pinpoint
exactly when the word “cloud”
was first used, but its origins lie in
the early days of network design.
When engineers charted out
networks, the diagrams became
nebulous blurs of connections.
Many engineers grouped
external connections together
inside a bubble or other similar
shape,which led to its eventual
designation as “the cloud.”
3
The Cloud as We Know it Today
These days, the term signifies data that is
accessed online via the Internet. Cloud-based
companies offer the following benefits:
Fast access: Quickly locate and access the
data you need.
Nearly infinite storage space: You don’t need
to worry about filling up your computer’s disk
drives, which slows its processes down—the
cloud can handle it for you (without losing
processing speed).
Shareability: Storing something on the cloud
allows you to share it with anyone else who
has access to the same service.
4
Why Can’t I Just Do it Myself?
There are several distinct advantages to
utilizing cloud storage.
The most important? Security. It is likely
that any client data you store contains
contact and payment information—
information you absolutely do not want
falling into the wrong hands.
There is also a threat of hard drive failure,
which can occur randomly without any
outside influence.
And no one is truly safe from a natural
disaster, however, your office is likely to
be much less prepared to handle damage
than a reinforced data center.
5
Cloud storage, while not 100%
guaranteed to keep your data
safe, comes much closer than
a local storage option. An ideal
data center has:
Trained security guards staffed
around the clock		
Extremely limited access
Protection against intangible
threats (e.g., corrupted files,
server failure, etc.) with
frequent backups of your
data in multiple locations, also
known as “redundancy”
*
*
*
6
Security Features to
Look for in a Provider
It can be overwhelming to look
at the long list of cloud storage
service providers and select
one to store and protect your
business data.
7
One of the most common security features is
encryption. There are two main methods of
encryption that websites utilize: symmetric-
key and public-key (also referred to as
asymmetric).
With symmetric-key encryption, each
computer has a secret key that it uses to
encrypt data before it sends it over the
network to other computers. The computers
on both ends must have the key installed in
order to be able to decode the contents of
the encryption.
Advanced Encryption Standard (AES)
uses 128-, 192-, and 256-bit keys, each
exponentially harder to crack than the last.
Data encrypted by AES-256, which the
National Security Agency (NSA) uses for its
top secret information would take billions of
billions of years to crack via brute force.
8
Public-key encryption uses a
public key to encrypt the data
and a separate private key to
decrypt, adding another level of
security on top of symmetric-key.
Another security feature found
in cloud storage is [LC2] zero-
knowledge password policy. Only
the client knows the password to
access their data—not the service
provider. The provider can’t
even see the details of your files,
except for how many you have
and how much storage space
they’re taking up.
9
To summarize, look for these security features
in a provider:
At least AES-128 encryption
(or a comparable level)
Redundant storage with scheduled backups
Providers that offer proof of ongoing security
testing against vulnerabilities
Different encryption keys used for different
customers
Providers that allow you to create your own
encryption key so that no one outside your
company has it
Providers that are transparent about the
security measures in place at their data centers
Expiration dates on private links shared
(limits access to sensitive data)
*
*
*
*
*
*
*
10
Take Charge
The first and most important step in protecting any
sensitive information is having a secure password. A
recent study has shown that 90% of passwords can
be cracked in seconds, even if their creator thought
it was complex enough.
PASSWORD:
11
?
?
?
?
?
?
To ensure a secure password
Use at least 12 characters in your password
Use a mix of upper and lowercase letters,
symbols, and numbers
Add random words to your password—the longer
your password, the more secure it is
Rotate passwords frequently
Don’t use the same password across multiple
accounts
Develop a password “algorithm”—pick a word
that you’re guaranteed to remember and use it as
the base for each password.
Check your password strength on a trusted
website like howsecureismypassword.net
*
*
*
*
*
*
*
12
Lastly, be alert when browsing the Internet.
Some websites, even trusted ones, can be
hiding malware or viruses, especially in their
ads. Be aware of what computers you log in
to; some browsers offer to remember your
username and password, and if you accept
that on a public computer, then anyone can
log in to your accounts.
Also, when downloading software or files,
be sure they come from a trusted source,
and read every text box that pops up on
your screen during the installation. If you
click “Continue” and breeze through all the
alerts without paying attention, you might
inadvertently give the software permission
to install something you don’t want on your
computer.
13
Want to Learn More?
Download our free eBook,
Security in the Cloud:
Tips on How to Protect Your Data
to discover the benefits of cloud-based
software as well as security tips to protect
yourself, your company, and your clients.
14
Download now
Procore Technologies, Inc., the world’s most widely used
construction management software, helps construction firms
simplify their processes with an easy-to-use, mobile-enabled
platform providing unlimited user licenses and renowned
customer support. Understanding the industry’s unique needs,
Procore’s user-centric product development ensures more
efficient project, quality, and financial management, helping
companies increase collaboration, build times, and profit.
For more information or a free demonstration visit
www.procore.com.
If you have any questions, please give us a call at
1.866.477.6267 or email us: sales@procore.com
PRODUCED BY
Procore Technologies, Inc.
Talk with an Expert
Visit The Jobsite >
Procore’s Hub for Original Content
Watch Procore TV >
Procore’s Official YouTube Channel
More Resources >
Free eBooks & Downloads

Weitere ähnliche Inhalte

Was ist angesagt?

Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastCloudflare
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs FactsOPAQ
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossarysinglehopsn
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityPeopleWorks IN
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. ModelVishal Sharma
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckAmazon Web Services
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overviewAllessandra Negri
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Trend Micro
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing Moshe Ferber
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidancedrewz lin
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 

Was ist angesagt? (20)

Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
Cloud Security Myths Vs Facts
Cloud Security Myths Vs FactsCloud Security Myths Vs Facts
Cloud Security Myths Vs Facts
 
Disaster recovery glossary
Disaster recovery glossaryDisaster recovery glossary
Disaster recovery glossary
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Growth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and SimplicityGrowth Uninterrupted with Security, Scalability and Simplicity
Growth Uninterrupted with Security, Scalability and Simplicity
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
 
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar DeckHow PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
How PagerDuty Achieved End-to-End Visibility with Splunk and AWS Webinar Deck
 
Security Challenges in Cloud
Security Challenges in CloudSecurity Challenges in Cloud
Security Challenges in Cloud
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
Automated Security for the Real-time Enterprise with VMware NSX and Trend Mic...
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 
Top Application Security Threats
Top Application Security Threats Top Application Security Threats
Top Application Security Threats
 
The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing The Cloud & I, The CISO challenges with Cloud Computing
The Cloud & I, The CISO challenges with Cloud Computing
 
Secaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidanceSecaa s cat_10_network_security_implementation_guidance
Secaa s cat_10_network_security_implementation_guidance
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 

Ähnlich wie Security in the Cloud: Tips on How to Protect Your Data

AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security ChallengesSTO STRATEGY
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computingDigital Shende
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing reportProduct Reviews
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceYury Chemerkin
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesTrend Micro
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 

Ähnlich wie Security in the Cloud: Tips on How to Protect Your Data (20)

AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
Security threat in cloud computing
Security threat in cloud computingSecurity threat in cloud computing
Security threat in cloud computing
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
CLOUD COMPUTING
CLOUD COMPUTINGCLOUD COMPUTING
CLOUD COMPUTING
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 

Mehr von Procore Technologies

Procore Construction Industry Outlook 2018: January to June
Procore Construction Industry Outlook 2018: January to JuneProcore Construction Industry Outlook 2018: January to June
Procore Construction Industry Outlook 2018: January to JuneProcore Technologies
 
Filling the Construction Labor Gap
Filling the Construction Labor GapFilling the Construction Labor Gap
Filling the Construction Labor GapProcore Technologies
 
Paper Weights–How Eliminating Paper Waste Can Save Your Business
Paper Weights–How Eliminating Paper Waste Can Save Your BusinessPaper Weights–How Eliminating Paper Waste Can Save Your Business
Paper Weights–How Eliminating Paper Waste Can Save Your BusinessProcore Technologies
 
Building a Safety Culture - Dodge Data and Analytics Report
Building a Safety Culture - Dodge Data and Analytics ReportBuilding a Safety Culture - Dodge Data and Analytics Report
Building a Safety Culture - Dodge Data and Analytics ReportProcore Technologies
 

Mehr von Procore Technologies (6)

Procore Construction Industry Outlook 2018: January to June
Procore Construction Industry Outlook 2018: January to JuneProcore Construction Industry Outlook 2018: January to June
Procore Construction Industry Outlook 2018: January to June
 
Filling the Construction Labor Gap
Filling the Construction Labor GapFilling the Construction Labor Gap
Filling the Construction Labor Gap
 
Safety by the Numbers
Safety by the NumbersSafety by the Numbers
Safety by the Numbers
 
Paper Weights–How Eliminating Paper Waste Can Save Your Business
Paper Weights–How Eliminating Paper Waste Can Save Your BusinessPaper Weights–How Eliminating Paper Waste Can Save Your Business
Paper Weights–How Eliminating Paper Waste Can Save Your Business
 
Stay Ahead of Risk
Stay Ahead of RiskStay Ahead of Risk
Stay Ahead of Risk
 
Building a Safety Culture - Dodge Data and Analytics Report
Building a Safety Culture - Dodge Data and Analytics ReportBuilding a Safety Culture - Dodge Data and Analytics Report
Building a Safety Culture - Dodge Data and Analytics Report
 

Kürzlich hochgeladen

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Kürzlich hochgeladen (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Security in the Cloud: Tips on How to Protect Your Data

  • 1. Security in the Cloud Tips on How to Protect Your Data
  • 2. The concept of the cloud can still be difficult for many to grasp. The name itself conjures up visions of important and private data floating around in the ether which doesn’t evoke a strong sense of security. However, cloud storage is much safer and more secure than many on-site servers and hard drives. 2
  • 3. What is the Cloud? It may sound like just one more buzzword that will soon pass but, in reality, the concept of cloud computing has been around for decades. It’s hard to pinpoint exactly when the word “cloud” was first used, but its origins lie in the early days of network design. When engineers charted out networks, the diagrams became nebulous blurs of connections. Many engineers grouped external connections together inside a bubble or other similar shape,which led to its eventual designation as “the cloud.” 3
  • 4. The Cloud as We Know it Today These days, the term signifies data that is accessed online via the Internet. Cloud-based companies offer the following benefits: Fast access: Quickly locate and access the data you need. Nearly infinite storage space: You don’t need to worry about filling up your computer’s disk drives, which slows its processes down—the cloud can handle it for you (without losing processing speed). Shareability: Storing something on the cloud allows you to share it with anyone else who has access to the same service. 4
  • 5. Why Can’t I Just Do it Myself? There are several distinct advantages to utilizing cloud storage. The most important? Security. It is likely that any client data you store contains contact and payment information— information you absolutely do not want falling into the wrong hands. There is also a threat of hard drive failure, which can occur randomly without any outside influence. And no one is truly safe from a natural disaster, however, your office is likely to be much less prepared to handle damage than a reinforced data center. 5
  • 6. Cloud storage, while not 100% guaranteed to keep your data safe, comes much closer than a local storage option. An ideal data center has: Trained security guards staffed around the clock Extremely limited access Protection against intangible threats (e.g., corrupted files, server failure, etc.) with frequent backups of your data in multiple locations, also known as “redundancy” * * * 6
  • 7. Security Features to Look for in a Provider It can be overwhelming to look at the long list of cloud storage service providers and select one to store and protect your business data. 7
  • 8. One of the most common security features is encryption. There are two main methods of encryption that websites utilize: symmetric- key and public-key (also referred to as asymmetric). With symmetric-key encryption, each computer has a secret key that it uses to encrypt data before it sends it over the network to other computers. The computers on both ends must have the key installed in order to be able to decode the contents of the encryption. Advanced Encryption Standard (AES) uses 128-, 192-, and 256-bit keys, each exponentially harder to crack than the last. Data encrypted by AES-256, which the National Security Agency (NSA) uses for its top secret information would take billions of billions of years to crack via brute force. 8
  • 9. Public-key encryption uses a public key to encrypt the data and a separate private key to decrypt, adding another level of security on top of symmetric-key. Another security feature found in cloud storage is [LC2] zero- knowledge password policy. Only the client knows the password to access their data—not the service provider. The provider can’t even see the details of your files, except for how many you have and how much storage space they’re taking up. 9
  • 10. To summarize, look for these security features in a provider: At least AES-128 encryption (or a comparable level) Redundant storage with scheduled backups Providers that offer proof of ongoing security testing against vulnerabilities Different encryption keys used for different customers Providers that allow you to create your own encryption key so that no one outside your company has it Providers that are transparent about the security measures in place at their data centers Expiration dates on private links shared (limits access to sensitive data) * * * * * * * 10
  • 11. Take Charge The first and most important step in protecting any sensitive information is having a secure password. A recent study has shown that 90% of passwords can be cracked in seconds, even if their creator thought it was complex enough. PASSWORD: 11
  • 12. ? ? ? ? ? ? To ensure a secure password Use at least 12 characters in your password Use a mix of upper and lowercase letters, symbols, and numbers Add random words to your password—the longer your password, the more secure it is Rotate passwords frequently Don’t use the same password across multiple accounts Develop a password “algorithm”—pick a word that you’re guaranteed to remember and use it as the base for each password. Check your password strength on a trusted website like howsecureismypassword.net * * * * * * * 12
  • 13. Lastly, be alert when browsing the Internet. Some websites, even trusted ones, can be hiding malware or viruses, especially in their ads. Be aware of what computers you log in to; some browsers offer to remember your username and password, and if you accept that on a public computer, then anyone can log in to your accounts. Also, when downloading software or files, be sure they come from a trusted source, and read every text box that pops up on your screen during the installation. If you click “Continue” and breeze through all the alerts without paying attention, you might inadvertently give the software permission to install something you don’t want on your computer. 13
  • 14. Want to Learn More? Download our free eBook, Security in the Cloud: Tips on How to Protect Your Data to discover the benefits of cloud-based software as well as security tips to protect yourself, your company, and your clients. 14 Download now
  • 15. Procore Technologies, Inc., the world’s most widely used construction management software, helps construction firms simplify their processes with an easy-to-use, mobile-enabled platform providing unlimited user licenses and renowned customer support. Understanding the industry’s unique needs, Procore’s user-centric product development ensures more efficient project, quality, and financial management, helping companies increase collaboration, build times, and profit. For more information or a free demonstration visit www.procore.com. If you have any questions, please give us a call at 1.866.477.6267 or email us: sales@procore.com PRODUCED BY Procore Technologies, Inc. Talk with an Expert Visit The Jobsite > Procore’s Hub for Original Content Watch Procore TV > Procore’s Official YouTube Channel More Resources > Free eBooks & Downloads