Menu Close

5 Methods to protect yourself from the Cloud

Cloud Technology is one of the most significant advancements in personal computing that has ever come around. We have access to any of our information, pictures, and media from any internet connected device, anywhere in the world. I talked about 5 reasons you should invest in the cloud in my last post, but I will say this, for all of the benefits that using the Cloud gives there is a need for caution. Not so much because of any faults in the software, but more to do with what happens if someone were to try to get into your system.

If you looked at my last post about this, you might think that cloud technology is entirely reliable and trustworthy, but I believe that no system is foolproof and there is no harm in taking extra precautions to protect your information. Like everything else, if you take specific steps, then you will be able to defend yourself from either attack or mistakes that would cause you to lose your data.

1) External Hard Drive Backups – Backing up your cloud data to an external hard drive is essential, because it will allow you to have a backup that you can control. If something were to happen to your information that would mean that it’s no longer there, then a secondary backup will ensure that you can re-establish your filing system with relatively little fuss. I back up my data because of two different The two scenarios that I worry about are if a hacker were to get in and take all of your information, and if you do something to your system that would cause all of your data to disappear.

2) Double encryption – Double encryption is a simple method which protects you from outsiders trying to get into your account. All Cloud services have an Internet-accessible interface, and what double encryption does is asks you to input a second code after you have entered your login information. The effect of this is that if someone were to try and hack your account, they would have a significantly harder time trying to get in because even if they got your login info, they would need the second code (which is typically texted to your phone) to get in.

3) Using Different Passwords for different systems – It’s crucial to make sure that if you access different things on the internet, you use different passwords. Having different passwords for different systems will make it so that A) its harder for hackers and whatnot to access your various programs if they don’t know which password you use, and B) if anyone figured out one of your passwords then they won’t be able to access your entire digital life.

4) Regularly scheduled backups – As an add-on to the first point of backing up your system to an External Hard Drive, it is also advisable to do so on a regular basis. Regular backups make it so that while you update the information on your system, you can also update the most recent backup. Doing both allows you to back up the most recent data and any changes you may have made since the previous one.

I like backing up my systems to an external hard drive because it makes it “user-proof.” There was a time a year or so ago where I was messing around with the settings on my iPhone, and at one point or another I pressed a setting that deleted my ENTIRE filing system….I was “not thrilled” with myself. Because I back up my system every month, I was only about 15 days out.

5) Use more than one system – It seems to me like common sense not to put all your eggs in one basket, and in Organizing Your Digital Life this wisdom is as accurate than ever. As a serious Mac user, I like the systems that they put out; however, I use them as cautiously as possible. While they do have great systems I use only a few of them because I worry that if someone were to hack into my one apple account they could wipe me out entirely. I use Evernote for my Writing, I use a different e-mail than what iCloud provided me, and I use Microsoft systems for other things. The point of using different systems for different things is so that, in the event of someone hacking your account, not everything you have is compromised.

Using Cloud technology is a smart way to keep all of your files and information in an easily accessible style that will not impede the usage of your computer. If you use the technology wisely and us the steps I’ve provided to protect your information you should be able to protect yourself from any who would try to steal your information. Using technology is good, using certain precautions to maintain your digital infrastructure is always better.

Are you able to protect yourself in case of infiltration?

Let me know in the comments section below. If you like this blog post and want to see more, you can follow me on Social Media (LinkedIn, Twitter, Instagram, and Facebook @jasonlovefiles) or Subscribe to my blog to get new content delivered directly to your mailbox.

2 Comments

  1. emelec

    584056 838314Found your weblog and decided to have a study on it, not what I normally do, but this weblog is great. Awesome to see a site thats not spammed, and actually makes some sense. Anyway, great write up. 787511

Leave a Reply

Your email address will not be published. Required fields are marked *