SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
A DIGITAL LIFE E-GUIDE
Keeping Your
CloudDatainCheck
Creating passwords, installing security software, practicing
safe surfing habits—these typical security measures are not
enough to protect your data stored in the cloud.
Many factors can jeopardize it.1
Cybercriminals, for one,
can conduct threat campaigns, where they hack into your
accounts and delete or leak your data for either notoriety or
money. The cloud service you use can suddenly experience
hardware failures or glitches that can wipe out your content.
Your internet connection can also become too intermittent,
making it almost impossible for you to access your cloud.
To avoid unnecessary grief, you need to adopt a security-
conscious mindset and take the extra steps to ensure the
safety of your data for years to come.
1	 http://about-threats.trendmicro.com/ebooks/files-in-flight/
When setting up an online account, pick a password recovery question that only
YOU can answer. Cloud services now provide uncommon security question choices,
unlike before when they only had questions like “What is your mother’s maiden
name?” The more unique the security question, the better. If given the option,
create the question yourself.
Next, craft answers that are as strong and as unique as the very passwords they’re
supposed to recover. You can do this by making the answer completely impossible
to look up online.
For example, if your security question is “Who is your favorite cartoon character?”
no one should be able to guess it by trying all the names of every cartoon character
ever made, looking at your social networking page, or checking the cartoons you
blog about. The answer should be just like your password, relevant only to you.
Jumble up the letters of the answer. Or better yet, turn it into an acronym phrase.
Take each letter of your original answer, and use it as the first letter of a word
until you come up with a random phrase. To make it more secure, pick an answer
completely irrelevant to the question itself. Any cybercriminal will have a hard time
guessing a security answer like this.
Here’s an example:
Security Question: Where did you meet your spouse?
Bad Answer: At work.
Good Answer: Aliens That Want Only Rocket Kits.
[This is a good answer since it’s random, and the acronym makes it easy enough for
you to remember.]
Best answer: Pistachio Ice Cream with a Pickle on Top.
[This answer’s complete irrelavance to the security question will give cybercriminals
a hard time figuring it out.]
Make sure only YOU can recover your password.
When you create online accounts for cloud services, they usually require your email
address for registration, verification, and notification purposes. In case you forget
your password, these cloud services let you reset your account passwords via email.
A risk arises if you use the same email address for every single one of your online
accounts. If a cybercriminal is able to hack into your email account, he or she can
gain access to all your other online accounts. Remove any password verification or
account signup notification emails from your inbox so cybercriminals will have no
clue what other accounts you have.
Assign different email accounts for all the cloud services you use. Be sure that
these email accounts are not tied to the one you use for personal correspondence.
If you need help in remembering multiple passwords, use password management
software like DirectPass.2
Whenever possible, also activate two-factor authentication for all your accounts.
From then on, accessing your online accounts will require both your password and
a unique verification number stored on either your smartphone or token. Even if
someone gets a hold of your password, he or she will still need the physical device
with your verification number to break into your account.
2	 http://www.trendmicro.com/us/home/products/directpass/index.html
Put your eggs in several baskets,
and then secure those baskets!
Take note of all the devices you use and map out what cloud accounts
you access with each one. From there, see how you can secure them.
If you access the accounts on your desktop, ensure that it’s free of
malware, and its software is regularly updated. If you access them on
your mobile device, guarantee that it has the necessary security features
against physical theft and cybercrime installed and activated.
Audit your devices every month or whenever you add or replace a device.
When deciding what security measures to take, choose those that are
appropriate for your devices. It may be a good idea to enable the remote
wipe function of your mobile phone or laptop in case they get lost or
stolen, but the same function might not be applicable to your desktop.
Check your devices.
Having a backup of your important data in the cloud may be convenient,
but you shouldn’t treat it as the cure-all of backup solutions. Nothing is
infallible. This is why you should make multiple backups of your data.
Follow the 3-2-1 rule3
:
•  Make a minimum of three backups,
•  Two of which should be on different media, and
•  One of them should be stored off-site.
Redundant backups reduce the chances of permanently losing your data.
With two of those backups on different media, each copy is immune to
any damage or malfunction—like hardware failure for external HDDs or
scratches on DVD backups—that may affect the other.
Finally, in case any unfortunate event or disaster affects your home or
office, you can be sure your data is safely stored off-site.
3	 http://blog.trendmicro.com/trendlabs-security-intelligence/world-backup-day-the-3-2-1-rule/
Create multiple backups.
If you really want to keep your data safe, then careless Internet habits
will have to go. Treat your cloud as the important data storage it is.
Refrain from sharing access to your cloud accounts to anyone, even
if it’s convenient to do so. Some cloud services have certain clauses
in their terms of service agreements that allow them to lock down or
delete accounts found storing any content violating the said agreement.
Unless you completely trust the person you’re sharing access to, limit
it to yourself. This prevents anyone from uploading malicious or illegal
content and protects your cloud from being locked permanently.
Don’t tempt fate.
Copyright ©2013 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend
Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
TRENDLABS
TrendLabs is a multinational research, development,
and support center with an extensive regional
presence committed to 24 x 7 threat surveillance,
attack prevention, and timely and seamless solutions
delivery. With more than 1,000 threat experts and
support engineers deployed round-the-clock in labs
located around the globe, TrendLabs enables Trend
Micro to continuously monitor the threat landscape
across the globe; deliver real-time data to detect, to
preempt, and to eliminate threats; research on and
analyze technologies to combat new threats; respond
in real time to targeted threats; and help customers
worldwide minimize damage, reduce costs, and ensure
business continuity.
TREND MICRO
Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global
cloud security leader, creates a world safe for exchanging
digital information with its Internet content security
and threat management solutions for businesses and
consumers. A pioneer in server security with over
20 years’ experience, we deliver top-ranked client, server
and cloud-based security that fits our customers’ and
partners’ needs, stops new threats faster, and protects data
in physical, virtualized and cloud environments. Powered
by the industry-leading Trend Micro™ Smart Protection
Network™ cloud computing security infrastructure, our
products and services stop threats where they emerge—
from the Internet. They are supported by 1,000+ threat
intelligence experts around the globe.
LEGAL DISCLAIMER
The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice.
The information contained herein may not be applicable in all situations and may not reflect the most current situation. Nothing contained herein should be relied
or acted upon without the benefit of legal advice based upon the particular facts and circumstances presented and nothing herein should be construed otherwise.
Trend Micro reserves the right to modify the contents of this document at any time without notice.
Translations of any materials into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise
related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the
translation are not binding and have no legal effect for compliance or enforcement purposes.
Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any
kind as to its accuracy, currency or completeness. You agree that access to and use of and reliance upon this document and the content thereof is at your own risk.
Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing or delivering this document
shall be liable for any consequences, losses, or damages, including direct, indirect, special, consequential, loss of business profits or special damages, whatsoever
arising out of access to, use of or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this
information constitutes acceptance for use in an “as is” condition.

Más contenido relacionado

La actualidad más candente

GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
Kristin Helgeson
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
judythornell
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
COMSATS
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
CrowdStrike
 
E-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimizedE-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimized
Lynn Feltner
 

La actualidad más candente (20)

Synchronized security
Synchronized securitySynchronized security
Synchronized security
 
IT security
IT securityIT security
IT security
 
Security Guide For Small Business
Security Guide For Small BusinessSecurity Guide For Small Business
Security Guide For Small Business
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk Justifying IT Security: Managing Risk
Justifying IT Security: Managing Risk
 
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target 2010-05 Real Business, Real Threats!  Don't be an Unsuspecting Target
2010-05 Real Business, Real Threats! Don't be an Unsuspecting Target
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
State of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers MindsetState of Endpoint Security: The Buyers Mindset
State of Endpoint Security: The Buyers Mindset
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Five Mistakes of Incident Response
Five Mistakes of Incident ResponseFive Mistakes of Incident Response
Five Mistakes of Incident Response
 
Ten Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business SecureTen Top Tips on Keeping Your Business Secure
Ten Top Tips on Keeping Your Business Secure
 
Infographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud SecurityInfographic: 5 Tips for Approaching Customers About Cloud Security
Infographic: 5 Tips for Approaching Customers About Cloud Security
 
Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?Is Cloud the new home for Cyber Criminals? How to be Safe?
Is Cloud the new home for Cyber Criminals? How to be Safe?
 
The 2018 Threatscape
The 2018 ThreatscapeThe 2018 Threatscape
The 2018 Threatscape
 
Take back your security infrastructure
Take back your security infrastructureTake back your security infrastructure
Take back your security infrastructure
 
The dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity MonthThe dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity Month
 
Enhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - InfographicEnhance Security with Windows 10 and Office 365 - Infographic
Enhance Security with Windows 10 and Office 365 - Infographic
 
E-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimizedE-FILE_Proofpoint_Uberflip_120915_optimized
E-FILE_Proofpoint_Uberflip_120915_optimized
 

Similar a Keeping Your Cloud Data in Check

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
Dominic Vogel
 

Similar a Keeping Your Cloud Data in Check (20)

How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Avoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile WebAvoiding Bad URL's In the Mobile Web
Avoiding Bad URL's In the Mobile Web
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Document safer online for nonprofits guide
Document safer online for nonprofits guideDocument safer online for nonprofits guide
Document safer online for nonprofits guide
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
The Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice GuideThe Small Business Cyber Security Best Practice Guide
The Small Business Cyber Security Best Practice Guide
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
How to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style VirusesHow to Knock Out Threats from Crypto-Style Viruses
How to Knock Out Threats from Crypto-Style Viruses
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Working from home- How secure is it.pdf
Working from home- How secure is it.pdfWorking from home- How secure is it.pdf
Working from home- How secure is it.pdf
 
Tech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event RecapTech Talent Meetup Hacking Security Event Recap
Tech Talent Meetup Hacking Security Event Recap
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Keeping Your Cloud Data in Check

  • 1. A DIGITAL LIFE E-GUIDE Keeping Your CloudDatainCheck
  • 2.
  • 3. Creating passwords, installing security software, practicing safe surfing habits—these typical security measures are not enough to protect your data stored in the cloud. Many factors can jeopardize it.1 Cybercriminals, for one, can conduct threat campaigns, where they hack into your accounts and delete or leak your data for either notoriety or money. The cloud service you use can suddenly experience hardware failures or glitches that can wipe out your content. Your internet connection can also become too intermittent, making it almost impossible for you to access your cloud. To avoid unnecessary grief, you need to adopt a security- conscious mindset and take the extra steps to ensure the safety of your data for years to come. 1 http://about-threats.trendmicro.com/ebooks/files-in-flight/
  • 4. When setting up an online account, pick a password recovery question that only YOU can answer. Cloud services now provide uncommon security question choices, unlike before when they only had questions like “What is your mother’s maiden name?” The more unique the security question, the better. If given the option, create the question yourself. Next, craft answers that are as strong and as unique as the very passwords they’re supposed to recover. You can do this by making the answer completely impossible to look up online. For example, if your security question is “Who is your favorite cartoon character?” no one should be able to guess it by trying all the names of every cartoon character ever made, looking at your social networking page, or checking the cartoons you blog about. The answer should be just like your password, relevant only to you. Jumble up the letters of the answer. Or better yet, turn it into an acronym phrase. Take each letter of your original answer, and use it as the first letter of a word until you come up with a random phrase. To make it more secure, pick an answer completely irrelevant to the question itself. Any cybercriminal will have a hard time guessing a security answer like this. Here’s an example: Security Question: Where did you meet your spouse? Bad Answer: At work. Good Answer: Aliens That Want Only Rocket Kits. [This is a good answer since it’s random, and the acronym makes it easy enough for you to remember.] Best answer: Pistachio Ice Cream with a Pickle on Top. [This answer’s complete irrelavance to the security question will give cybercriminals a hard time figuring it out.] Make sure only YOU can recover your password.
  • 5.
  • 6.
  • 7. When you create online accounts for cloud services, they usually require your email address for registration, verification, and notification purposes. In case you forget your password, these cloud services let you reset your account passwords via email. A risk arises if you use the same email address for every single one of your online accounts. If a cybercriminal is able to hack into your email account, he or she can gain access to all your other online accounts. Remove any password verification or account signup notification emails from your inbox so cybercriminals will have no clue what other accounts you have. Assign different email accounts for all the cloud services you use. Be sure that these email accounts are not tied to the one you use for personal correspondence. If you need help in remembering multiple passwords, use password management software like DirectPass.2 Whenever possible, also activate two-factor authentication for all your accounts. From then on, accessing your online accounts will require both your password and a unique verification number stored on either your smartphone or token. Even if someone gets a hold of your password, he or she will still need the physical device with your verification number to break into your account. 2 http://www.trendmicro.com/us/home/products/directpass/index.html Put your eggs in several baskets, and then secure those baskets!
  • 8. Take note of all the devices you use and map out what cloud accounts you access with each one. From there, see how you can secure them. If you access the accounts on your desktop, ensure that it’s free of malware, and its software is regularly updated. If you access them on your mobile device, guarantee that it has the necessary security features against physical theft and cybercrime installed and activated. Audit your devices every month or whenever you add or replace a device. When deciding what security measures to take, choose those that are appropriate for your devices. It may be a good idea to enable the remote wipe function of your mobile phone or laptop in case they get lost or stolen, but the same function might not be applicable to your desktop. Check your devices.
  • 9.
  • 10.
  • 11. Having a backup of your important data in the cloud may be convenient, but you shouldn’t treat it as the cure-all of backup solutions. Nothing is infallible. This is why you should make multiple backups of your data. Follow the 3-2-1 rule3 : •  Make a minimum of three backups, •  Two of which should be on different media, and •  One of them should be stored off-site. Redundant backups reduce the chances of permanently losing your data. With two of those backups on different media, each copy is immune to any damage or malfunction—like hardware failure for external HDDs or scratches on DVD backups—that may affect the other. Finally, in case any unfortunate event or disaster affects your home or office, you can be sure your data is safely stored off-site. 3 http://blog.trendmicro.com/trendlabs-security-intelligence/world-backup-day-the-3-2-1-rule/ Create multiple backups.
  • 12. If you really want to keep your data safe, then careless Internet habits will have to go. Treat your cloud as the important data storage it is. Refrain from sharing access to your cloud accounts to anyone, even if it’s convenient to do so. Some cloud services have certain clauses in their terms of service agreements that allow them to lock down or delete accounts found storing any content violating the said agreement. Unless you completely trust the person you’re sharing access to, limit it to yourself. This prevents anyone from uploading malicious or illegal content and protects your cloud from being locked permanently. Don’t tempt fate.
  • 13.
  • 14. Copyright ©2013 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. TRENDLABS TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity. TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge— from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable in all situations and may not reflect the most current situation. Nothing contained herein should be relied or acted upon without the benefit of legal advice based upon the particular facts and circumstances presented and nothing herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without notice. Translations of any materials into other languages are intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro makes no warranties or representations of any kind as to its accuracy, currency or completeness. You agree that access to and use of and reliance upon this document and the content thereof is at your own risk. Trend Micro disclaims all warranties of any kind, express or implied. Neither Trend Micro nor any party involved in creating, producing or delivering this document shall be liable for any consequences, losses, or damages, including direct, indirect, special, consequential, loss of business profits or special damages, whatsoever arising out of access to, use of or inability to use, or in connection with the use of this document, or any errors or omissions in the content thereof. Use of this information constitutes acceptance for use in an “as is” condition.