Advanced Search:

Contact us

联系我们

Telephone:(852) 2838 3620

Email:sales@silverwing.com.hk

Address: Unit 2, 4/F, Kwai Cheong Centre, 50 Kwai Cheong Road, Kwai Chung, New Territories, Hong Kong
Your Current Location :Home » News » Industry  » Three ways to protect cloud data security

Three ways to protect cloud data security

Source: Time:2017-07-20 10:45:29 views:

        More and more consumers are using the cloud to store their most valuable information, thus, cloud security is put on the agenda, the application of a variety of possible verification methods, hoping to protect the user's use of security. For consumers, cloud technology is a great gospel: it allows consumers to store at a very low cost or zero cost of mass information - music, information, photos and so on. With a variety of services, people can store more data at will, without having to buy additional equipment, such as hard drives or memory sticks.


云端数据安全


        From this point of view, cloud technology is like a giant free storage cabinet, but it also has a special security risk. Unlike physical file cabinets, the data stored in the cloud may be at risk of theft by global cybercriminals. If these lawless elements attack, they are likely to get a lot of information.


        The most common way for criminals to invade cloud services is to steal a consumer password and then enter his account. The way they implement this approach includes invading the cloud service company's database, spoofing consumers by providing their passwords (usually using e-mails disguised as cloud service companies) or directly guessing the user's password because many consumers are still using those It is not difficult to guess the password, such as "123456" or "password". At the same time, consumers may re-use the same password, which will lead to a series of accounts have been invaded.

        "In view of the growing growth of online business, consumers may use the same password on multiple websites, which will put consumers at risk.If a site," says Megan Stifle, director of network security policy at Public Knowledge, Consumer Rights Group, The password is compromised, such as its mailbox account, then the hacker will try to use the same password and simple password variant to invade the most important site in the user's inbox.


        Fortunately, cloud services companies attach great importance to the issue of cloud security. Many companies are providing consumers with easy-to-use ways to secure their data. There are three more secure ways. When someone tries to log in to an account from a strange computer, these methods require the login to provide additional information.


        The first additional security method is to use simple messages, such as Google and Microsoft such companies have long been using this method, that is, to send a verification code to the consumer's mobile phone, and then asked to enter the password at the same time Enter confirmation code. Although this approach has its advantages, but can still be stubborn lawless elements to break, because they can deceive the communications operators, so that operators will send text messages to their mobile phone. This is why some users turn to other solutions to enhance the Cloud platform cloud security reasons.
 
        The second approach relies on mobile applications, and companies using such methods include Duo and Authy. These applications provide an ever-changing serial number as an adjunct to the consumer's password. The application is relatively easy to use, because users do not have to wait for text messages, and criminals can not be done by cheating operators to crack.


        The third way to ensure cloud data security does not require the use of mobile phones, but the need for consumers to insert a small secret key device on the computer. The most common of these devices is "Yubikey", made by a company called Yubico, for just $ 19. It can be compatible with such as Facebook and Dropbox commonly used service providers. This way is more secure, because it requires users to log on a strange computer when the secret key entity, and hackers do this is almost zero. The secret key is also faster in this way because it does not need to enter the verification code sent to the phone.


         "We can look like this," says Jerrod Chong, vice president of business solutions at Yubico. "People need keys to drive, and keys are needed to open the door, and the key is the physical key that confirms people's online identity." The difficulty of getting confidential information from the entity YubiKey It is much more difficult to get this information from mobile applications. "
 
        The above three methods are very convenient. For most consumers, the most important step is to inform the major cloud computing companies (including Google, Microsoft, etc.) that serve them, and they want to implement them. This involves entering security settings and adding additional defenses. These measures are often referred to as "double verification". (In general, the easiest way to find this setting is to search for "Dropbox double validation" on the web.
 

        In short, more and more consumers are using the cloud to store their most valuable information, including their files and photos. As people increasingly rely on cloud services, the use of additional security verification means is more important than ever.


                                          Home |  About us |  Product  |  Solution Provider  |   News |  Contact us  粤ICP备17091917号-1

                              HK Address: Unit 2, 4/F, Kwai Cheong Centre, 50 Kwai Cheong Road, Kwai Chung, New Territories, Hong Kong


Top