{"id":1966,"date":"2013-05-30T10:00:03","date_gmt":"2013-05-30T14:00:03","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1966"},"modified":"2013-05-30T10:03:34","modified_gmt":"2013-05-30T14:03:34","slug":"cloud-file-storage","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/cloud-file-storage\/1966\/","title":{"rendered":"A Guide to Cloud File Storage"},"content":{"rendered":"<p>Everything is about the cloud these days, but as we increasingly store our personal and professional data on remote servers it is essential to know that nothing is 100 percent secure.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113530\/clouds_title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-1969\" alt=\"clouds_title\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/05\/05113530\/clouds_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>For one, attackers can break into seemingly secure servers of major companies to steal all sorts of user data, including account login and password information. Just ask Evernote, Yahoo or DropBox. But the greatest threat can come from less intricate attacks that take advantage of readily available information like a user\u2019s email or physical address to reset passwords to one account; once that is done it\u2019s a short leap to crack into any number of other accounts and have your personal, professional and financial information exploited, your reputation tarnished and your data and online accounts deleted and destroyed. Just <a href=\"http:\/\/www.wired.com\/gadgetlab\/2012\/08\/apple-amazon-mat-honan-hacking\/\" target=\"_blank\" rel=\"noopener nofollow\">ask Wired\u2019s Mat Honan<\/a> \u2014 and if it can happen to a technology journalist, it can happen to you.<\/p>\n<div class=\"pullquote\">The greatest threat can come from less intricate attacks that take advantage of readily available information like a user\u2019s email or physical address to reset passwords to one account.<\/div>\n<p>Of course, we want to move everything to the cloud so we don\u2019t have to store all of that data \u2014\u00a0our emails, music, photos, etc. \u2014\u00a0on our own hard drives and so we can access all that data on all of our devices. But the pitfalls of cloud security, as Kaspersky Labs\u2019 research expert <a href=\"http:\/\/www.securelist.com\/en\/blog\/653\/Lab_Matters_Cloudy_with_a_chance_of_stolen_data\" target=\"_blank\" rel=\"noopener nofollow\">Costin Raiu notes<\/a>, are severe.<\/p>\n<p>\u201cThe risk here is that your data can be lost forever\u2026 or it can be stolen,\u201d he says. \u201cThe people who steal it can use it for all sorts of bad things.\u201d<\/p>\n<p>So with so much riding on the cloud, how can you protect everything you put in it?<\/p>\n<ol>\n<li><b>Use two-factor authentication whenever possible<\/b>. Google, Facebook and Twitter offer it, and an increasing number of other sites do too. It\u2019s not the fastest way to get to your data, but it makes everything you value a whole lot safer.<\/li>\n<li><b>Use different passwords for different accounts<\/b>. This may be hard to keep track of, but you can use a password manager to help you keep track of all of them.<\/li>\n<li><b><\/b><b>Use different logins<\/b>. Don\u2019t use similar logins \u2014 such as first letter\/last name followed by @gmail.com or @yahoo.com \u2014 for different accounts.<b><\/b><\/li>\n<li><b><\/b><b>Create single-function emails for financial and recovery information<\/b>. Make an email account for any account that has a credit card or banking information to it. Make a separate account for password and account data recovery information. <b><\/b><\/li>\n<li><b><\/b><b>Physically backup your data<\/b>. The cloud will fail somewhere along the way, so anything you can\u2019t live without should be backed up regularly onto multiple drives and in multiple places. Store this data on a PC as well as an external hard drive, and keep one of those physical backups in a safe location outside of your home \u2014 your office or your parents\u2019 home, for instance \u2014 so that data isn\u2019t lost in the event of fire or burglary or some other unplanned disaster. <b><\/b><\/li>\n<li><b><\/b><b>Take Extra Precautions with Specific Data<\/b>. There are three levels at which you can protect particular data.\n<ul>\n<li>The lowest level is to password-protect specific Word and Excel documents \u2014 do this by clicking \u2018Tools,\u2019 then selecting \u2018Protect Document\u2019 and then entering a password.<\/li>\n<li>The next step up security-wise is to encrypt and compress files in RAR or Zip formats and to protect those folders.<\/li>\n<li>An even higher level of protection is to use, for the truly sensitive stuff, an encryption programs like those included in full system security suites like PURE 3.0 are designed to lock your data up in Fort Knox-style safety.<\/li>\n<\/ul>\n<\/li>\n<li><b>Passwords, passwords, passwords<\/b>. The simplest way to protect any and all information is one of the simplest \u2014 creating and using extremely strong passwords (and not duplicating them across accounts\u2026 see step 2). Do not use any word that would be found in a dictionary. Don\u2019t use dates or names, either. Make them long \u2014 18-plus characters with numbers, letters and non-alphanumeric symbols. Remembering them might be hard at first, but password managers can help with that (see step 2 again.<\/li>\n<li><b>Protect all your devices <\/b>\u2013 Be sure all devices you use are equally secure by using the latest protections available. Use Kaspersky Mobile Security on Androids and Find My iPhone for Apple devices. It is also important to add extra security measures like a password or PIN lock for your mobile devices.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Everything is about the cloud these days, but as we increasingly store our personal and professional data on remote servers it is essential to know that nothing is 100 percent<\/p>\n","protected":false},"author":41,"featured_media":1968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[263,406],"class_list":{"0":"post-1966","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-data-storage","9":"tag-file-protection"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/cloud-file-storage\/766\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cloud-file-storage\/1966\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cloud-file-storage\/1966\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/data-storage\/","name":"data storage"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1966"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1966\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1968"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}