Truly Care about Personal Cloud Security? Here’re 3 Golden Rules to Follow

Can you recall how the personal IT infrastructure of yours used to look like about 8 or 9 years ago?

The chances are you just had a typical desktop computer or just had your first laptop with you. Dial up connection was what you probably relied on or you had a relatively poor DSL connection. Practically the smartphones were dinosaurs compared to what’s being used today, and probably you didn’t you’re your hands on entire gigabytes of the data you needed to save.

But, huh, how much the time has changed! Now even our own IT micro universe resembles a piece out of corporate infrastructure, as we rely on many services for handling our data and making it easily accessible from anywhere for us.

As a matter of fact, we do trust the ‘cloud way ‘more and more today. Now even our ID scans, bank documents and confidential business stuff find their new place of residence onto the cloud. But the question is, can you really be sure your valuable information is going to be safe & secure right there?

Here we present you 5 golden cloud data privacy protection rules to follow if you want to lock your cloud privacy out, let’s start – shall we?

1. Never store sensitive information on cloud

It’s believed (and for good) that once something is on the Internet, it’s not private anymore! So, it’s fair enough to not put your information over cloud. But, it literally is a question similar to as if some asks “how they can avoid their house to be burned down?” and answer coming out as like, “don’t build a house at all”. Now the logic here is solid, no second thoughts on that – but such advice can be better translated in this case as, “try not to use cloud for storing sensitive information”. So, if you get a choice you should better opt for not storing your crucial information and data on cloud – keep it away from the virtual world or make use of appropriate solutions.

2. Only go with encrypted cloud services

Apart from storage and backup, few cloud services provide local decryption and encryption of your files being stored with them. That means such services take care of encryption your data files on your computer as well as storing them on the cloud safely. Therefore, it’s more likely that no one (including server administrators or service providers) will have any access to your data anytime. Now that the so called privacy gesture maintained by serious companies being and is dubbed as “zero-knowledge”. Spideroak and Wuala are a couple of such services we can recommend, if you want to have some to start with – and of course, do your research to compare them in an attempt to see what suits you the best.

3. Encrypt. Encrypt. Encrypt.

So far, Encryption is the best way with which the data can be protected. Generally for the cloud, encryption works like: Suppose you’ve a file that you want to be moved to a cloud service, you make use of a software that enables into creating password for that particular file, you then move that exact password protected data file to your cloud and no one is going to be able to view the content in it without knowing the password you set.

The easiest way to achieve is zipping files and then encrypt them via a password. B1 Free Archiver is one tool you can use to that end – it’s a multiplatform compression tool offered for free. As you create the archive check/tick “Protect with a password” option there, type in your desired password (keep it strong, as being the mixture of symbols, numbers and alphabets) and just after complete this process you should better move your files to cloud. In case you want to have it shared with someone simply let that person know your password. Please note, B1 Free Archiver only zips files in B1 format that makes the ultimate protection of your valuable information more reliable.

There you go, these were the golden rules you tend to follow whenever going with personal cloud. Take one step ahead if you really care about your security and privacy!

Leave a Reply

Your email address will not be published. Required fields are marked *