Tuesday, November 13, 2012

5 Ways To Keep Your Most Important Data Safe!

Share this ARTICLE with your colleagues on LinkedIn .

With the widespread acceptance of cloud computing, mobile device uplink and download access, and other publicly shared resources and potentially interceptable means of storing, accessing, transferring or working on critical data, there are some very dangerous dependencies and vulnerabilities emerging which could wreak havoc with your business and your life.

Shared services may be economically viable and highly advantageous, but they don't provide a foolproof method of keeping your most important data (we old-schoolers like to refer to this as hard drive material and computer desktop material -- I love the icons I've put on my computer screen...they comfort me) readily available for your use (in a comfortable format), or safe from unauthorized sharing or loss.

The problems and risks with dependency upon the cloud (software as a service) or even partial integration of cloud services are many. To cite just several:

1) The cloud can be pierced or intercepted and data or files either seen, stolen or eradicated;

2) The cloud is still based upon a platform (with servers and such) and can either be hacked into (as stated above), or can be infested with malware, viruses and a variety of other cybercritters [a friendly and cute lingovation , rather like calling a cancer a "multiplicative cellular overachiever"], any of which can infest every single user's files and devices with the dizzying speed and lethality of a pandemic - an illustration of the areas of vulnerability follows - simply multiply a problem with a server, infrastructure, the platform and the application by the number of clients and you've done a preliminary assessment of the first bout of the 'theoretical' pandemic...

3) There has been far too little discussion of the effects of  a microwave and electromagnetic bursts upon the viability or integrity of any cloud-based system. These forces, either in general or as short, deliberate bursts, could disrupt or destroy cloud service.

Here Are The Five Ways To Keep Your Most Important Data Safe:

1)  Always keep your most important hard drive data (images, correspondence, audio and video files) on a back-up hard drive storage device which is unhooked (unless it is being updated) to any of your computer or electronic connections. Keep it in a very safe, fireproof and waterproof, antimagnetic place;

2)  Using powerful encryption, attach these files to emails and store them on a web-based email service such as Gmail or Yahoo!. This is more for disaster recovery contingencies than for privacy purposes. Do not store this data on any web-based email service which is affiliated with your cloud host provider;

3) Be certain to double up on your anti-virus, anti-spam and anti-malware protection which you use on your own personal computing or mobile device;

4) Do not open inbound emails or attachments or download any files or applications on the same apparatus you use for storing your most important data. Use a second device for that specific purpose;

5) In case you need to access your important data or to save all or part of it from some site other than your own (i.e., when you're traveling), get a virtual desktop program, and travel with a storage drive or similar apparatus.

Please download the following white paper. It is free, there are no subscription fields to fill out, it is printable and can easily be shared with your colleagues and contacts in all of your social media groups. It is wonderfully informative and it cites "5 Ways To Virtualize Desktops.":


Just For Fun: If you need to, always have a high-powered, thorough file shredder and eraser program installed on any computer which you have which your fear that someone is going to access without your consent. At the time of this particular writing, there is no application quite as suitable for eradicating all traces of important data and files from your mobile devices. A colleague laughingly said that the best way to obliterate all discernible or re-constructable traces of files from a mobile device is to stomp on it, pull out any SIM card or other bit of chippery, and take the demolished remnants and immerse them in a solution of sulfuric acid, nitric acid (or if you are opposed to acid, as were my parents when I was growing up - kidding...) drop the pieces to macerate in a container of Liquid Plumr.

Thank you, as always for reading me.

Douglas E. Castle for The InfoSphere Business Alerts And Intelligence Blog, The CrowdFunding Incubator Blog, The Taking Command Blog and The Sending Signals Blog.

Please be sweet and retweet.

View DOUGLAS E. CASTLE's profile on LinkedIn

Douglas E Castle
All Blogs & RSS Feeds

Share this page
Contact Douglas Castle
Follow Me on Pinterest


No comments:

Bookmark and Share