Nowadays, cloud computing has become more and more widely implemented. More and more users are putting part of their digital life into the cloud. At the same time, they often encounter a problem that people rely on cloud services just like any other Like business, they do not exist anytime and anywhere, and they may also face the danger of closing.
Recently some cloud services shut down or completely changed the product content, the following service for these paragraphs
Boxee (Set Top Box and Network Digital Video Recorder)
Google Reader (RSS Reader)
MySpace (Community Network)
SnapJoy (photo sharing)
SimSocial (game)
The changes brought about by these services also have obvious "pains". Take MySpace for example, it has introduced new features for some time, and in June re-introduced the new version. Some people appreciate this new version, but some loyal users are still frustrated, because the new version will delete their content.
The rapid pace of innovation in mobile technologies and cloud services also means that if it is unfortunate enough to succeed and quickly monetize it, it will be shut down even though many users rely on their services. So as a user, if the same thing happens to you, what can you do to minimize the risk?
If the service itself does not use the data you belong to (for example, video and music streaming service), then you have nothing to do. However, if your own data, such as documents, pictures and news sources list, then there are some steps can be carried out.
Remember the traditional 3-2-1 backup rules: At least three copies, stored in at least two different media, at least one is off-site storage. Keeping your data in the cloud complies with the last two requirements, but these copies can not be stored in a closed cloud that serves itself.
For example, keep your movies and photos on your device (or even another cloud service). The procedure is different for different cloud services, but the concept is the same: Make sure your data exists outside of your own application or service server.
Preparing for a cloud service offline can be like an extreme precaution. But beyond the disappearance of the service, there are many things that will make you need to take offline access to the cloud service: you are offline / unsafe / expensive or your service is offline for maintenance or security incidents.
For cloud service providers, they are best advised to make announcements a few months before major changes (or shutdowns). The recent Google Reader shutdown is a good example of a valid announcement because it minimizes user impact (except for having to look for another alternative, of course). The unfortunate absence of MySpace shows that changes or enhancements can be counter-productive.
Benchmark: "Putting it into the cloud" is not an excuse to let you manage your data. You still need to be responsible for your data and avoid having all your eggs in the same basket.
Keep your cloud data in the hands
Create a password, install security software, develop a secure Internet habits. These typical security measures are not enough to protect your data stored in the cloud.
There are many factors that could jeopardize it. Note 1 As an example of cybercriminals, they may plan attacks for fame or money and invade your account to delete or disclose your data. The cloud service you are using may suddenly encounter hardware problems, all of your things being eliminated. Your network connection may become too slow and barely accessible to your cloud service.
In order to avoid unnecessary tragedies, you need to be aware of safety and take extra steps to ensure the security of your data in the coming years.
Make sure only you can reply to your password.
When setting up an online account, select the only one you can answer the password reply. Today's cloud services have less common security issues, the more unique security issues the better. If you can, create your own problem.
Next, create strong enough and unique answers just like the ones you want to recover. It is impossible to find the answer on the internet.
For example, if your security question is - "Who is your favorite cartoon character?" No one should try every cartoon character name, check your social network, or check the cartoon you mentioned in your blog Find the answer The answer should be just like your password, only to you.
Mix the letters of the answer better, or turn it into an acronym. Use each letter of your original answer as the first letter of a word. Combined into a random phrase. In order to make it safer, you have the choice of completely irrelevant answers to the question itself. Any cybercriminals will find it very difficult to guess such a safe answer.
Below is an example:
Security Question: Where did you meet your other half?
Bad answer: At work (at work).
Good Answer: Aliens That Want Only Rocket Kits (aliens only need rocket kits).
[This is a good answer because it is random and abbreviations make it easy enough for you to remember. 】
Best answer: pistachio ice cream top with sour
[This answer has absolutely nothing to do with security issues, so cybercriminals find it hard to guess. 】
Put the eggs in a few baskets and then protect the baskets!
When you set up a cloud service online account, they usually need your email address to register, confirm and notify. If you forget your password, these cloud services allow you to reset your account password by email.
If every one of your online accounts uses the same email address, there is a risk. If cybercriminals can crack your e-mail account, he can get all your other online accounts. Delete all the mailbox password authentication or account application notification e-mail, so that cybercriminals can not know what you have other accounts.
All your cloud services are assigned different email accounts. Make sure these email accounts are not the one you used for personal email.
If possible, enable two-factor authentication for all accounts. From now on, accessing your Internet account requires your password and the unique code provided by your smart phone or dongle. Even if someone gets your password, he / she still needs a physical machine with your verification code to enter your account.
Check your device.
Pay attention to all the devices you use to confirm which one will be used to access which cloud services. Then study how you can defend them. If you have an account on your desktop computer and make sure it is not poisoned, the software is regularly updated. If you access them from your mobile device, make sure it has an installed base and launches enough security features to handle physical theft and cybercrime.
Check your device once a month, and every time you add or replace a device. When deciding what safety measures to take, choose the one that suits your equipment. It is a good idea to start remote wiping on your phone or laptop to prevent them from being lost or stolen, but this feature may not be suitable for desktop computers.
Create multiple backups.
Backup your important data in the cloud may be convenient, but you should not think of it as the only antidote to backup problems. Nothing is foolproof. This is why you should have multiple backups of your data.
Follow the 3-2-1 rule Note 3:
§ At least three backups,
§ Two of them should be in different media,
§ One of them should be stored offsite.
Redundant backups reduce the risk of losing data permanently. Placing backups on different media avoids issues such as broken or failed backups (such as hardware failures on external drives and scratches on DVD backups) affecting other backups.
Finally, in the unlikely event of any unfortunate incident or disaster affecting your home or office, you can ensure that your data is stored securely offsite.
Do not take unnecessary insurance.
If you really want to make sure your data is safe, you must discard unsafe and unprotected internet habits. Use cloud services as a storage medium for important data.
Do not share your cloud account with anyone, even if this is handy. Some cloud services have several terms in the service agreement. Once they find that any stored content violates the above agreement, they may have the right to lock or delete their account.
Unless you can fully trust who you share access, or only for their own use. This prevents someone from uploading malicious or illegal content and protecting your cloud services from being permanently locked.
【Editor's Choice】
Why start-up companies say that the use of cloud services is a waste of money? How to choose just right cloud service? Hybrid cloud services the other stone: virtual data center services [Editor: Xiao Yun TEL: (010) 68476606]