The dangers of a virtual data sharing system in cloud storage

How to use cloud storage? The dangers of virtual data sharing. In cloud storage or online storage, data is stored centrally on the Internet. This system has several advantages, but also risks. In the end, you give your data to third parties! The geographic area of the cloud provider is an important selection criterion. When your data is stored abroad, it is subject to another data protection law.

To protect yourself: – select the appropriate cloud provider. Foreign cloud providers, and in particular non-European cloud providers, sometimes have data protection weaknesses. – choose secure access. When you have the opportunity, use two-factor authentication. – Follow our 6 rules to create a strong password.

For more information: – transmit your data only in encrypted form. Select a service where the data transfer is encrypted. For example, in your browser, you can confirm this by checking that the address bar starts with https: // and the lock symbol is displayed.

– Store your data only in encrypted form. In the general case, it is impossible to verify that your data is indeed encrypted by the cloud provider. Therefore, it is best to take care of the encryption and decryption of your sensitive data.

– Protect your data on local disk. As a rule, it is also impossible to verify that your data has been correctly copied by the cloud provider. It is better to make regular local backups of data stored in the cloud.

Cloud storage or cloud-based storage is storage available only online. Data stored in the cloud (documents, photos, movies, passwords, etc.) can be accessed (simultaneously) from multiple devices regardless of where you are. This mobile access allows you, for example, to view, share and edit photos even on the go. Finally, this solution allows several people in different places to work on the same document.

Data hosting is the main use of the Internet. Long reserved for professionals and tools (mail, …), it has expanded, in recent years, the storage of individual data. There are no storage devices in the clouds … your data is stored on a computer that you do not control in an unknown place. Among interconnected networked computers, some computers act as a ‚Äústorage tank,” where other computers can store or draw files; they are servers. Thus, the website is located in an area accessible to Internet users and contains files (pages or documents) that will be available to visitors, with or without restrictions, this is a primitive version of the cloud.

With the advent of the Internet, letters have come that are also files. They are stored on the servers of service providers (ISPs) for downloading and / or consulting Internet users. Cloud hosting is not a new phenomenon, but is inextricably linked with the asynchronous nature of the Internet: someone registers a file in space, and this file can be viewed or downloaded by someone else, at other times Computers were initially connected on the local network; mini-computers allowed dozens or hundreds of terminals to connect and gain access to shared resources and power them.

In subsequent years, the industrial production of microcomputers favored individual use, first by companies and then by individuals. With the advent of the Internet, individual computers and local networks could be interconnected, and previously available local resources became available without territorial restrictions: the hosting business consists in leasing disk space and sharing infrastructure. powerful, fast and reliable equipment for accessing stored data.

A workplace is never static. Its development includes virtual servers and the increasing use of public cloud storage services. Cloud storage is important for companies. As a result, data protection must continue to evolve to meet the needs of these ever-changing situations. Companies must expand their data security policies to focus on data protection no matter where they are located, and not just protect individual devices. This document analyzes data protection related events and indicates how our solution can help you protect data wherever it is.