Mobile Protection Toolbox
- Mobile Apps
- Digital Wallet
- Cloud Computing
- Security Software
- Detection Skills
- Glossary &
- Cloud computing is an Internet-based service that allows a user to store and access his or her programs and files remotely.
- When you save and store information and personal files using cloud-based software, you may be giving a third party access to your files.
- Some cloud services have weaker security systems than others. A weak security system can make your device, and the information stored in the cloud, vulnerable to phishers, spammers, hackers and other cyber criminals.
- Choose a cloud service that is well-known and trusted or has been recommended by friends or family members who have used the service.
- Look for a cloud storage service which encrypts your data so that third parties and the storage service you are dealing with cannot see your file names or open and read the content. This information should be detailed on the company's website.
- If the company does not do so for you, consider encrypting your data yourself before using a cloud storage service in order to protect your information.
- Know the limitations of your cloud storage service before you start uploading. Read about the features offered and make sure you understand what they mean.
- Find out what backups are in place in the event of data loss.
- Search for a cloud storage service which gives you control to set file and folder settings, to manage who can access and make changes to your files.
- Contact a representative of the company you are considering using if you are unsure about their security settings and protocols. This contact information should be provided clearly on its website.
- The same security practices used on your personal computer or mobile device should be applied when sharing information over a cloud service. For example, protecting your files with a strong password containing upper and lowercase letters and numbers is very important.
- Never store your password information, online banking credentials or other sensitive documents through a cloud service.
- Date modified: