How safe is online data storage? Should you entrust your personal, financial and proprietary data to a cloud IT service? The answer to the first question is, yes, because cloud storage, among other things, employs data encryption. (More on this later.) The answer to the second question may be moot. Your organization may be subject to laws on business continuity, and off-site data storage may be your only option.
Why online data storage is safe
Entrusting your data to a service provider is safer than storing it locally when said provider takes the following measures:
Your data arrives already encrypted.
Your data uploads to an external server, but before it leaves the friendly confines of your system, an algorithm does its encryption magic. The algorithm is from a key, and that key can only be turned with a user password to access encrypted files. Algorithms are complex. To break into an encrypted file without a password requires much more time and computing power than the average hacker can afford.
When you can’t encrypt your data, the provider will do it for you.
Sometimes, when the client’s system is slow or poorly connected, the service provider can activate server-side file encryption. As in the pre-upload process of encryption, access is through passwords. The difference is that the service provider does the encryption, generates the passwords, and works closely with client data center administrators. Reliable service providers ensure strict password access and security measures.
SSL (Secure Socket Layer Encryption) is another layer of encryption.
SSL protects login credentials and the data stream from unauthorized tapping. It is another encryption technique used to securely transfer your data to the server (and vice versa). Using software on your system and the server, SSL forms the link. When the data flows between you and the server, the server identifies the originator as valid — through a certificate process — and the secure, encrypted session begins.
External data centers provide hardened and focused data security management.
Dedicated data centers typically have several servers in the same access-restricted location. The best security precautions include:
Redundancy is guaranteed through RAID reliance.
RAID, a redundant array of independent disks, is a common configuration in the most secure data centers. If a hard disk fails, its data goes to a new (redundant) hard disk through yet another preset algorithm. This ensures client data is not lost.
In addition to high-tech security features, the best service providers have data centers hardened to handle disasters — fire and flooding, etc. They may have their own backup facilities away from their premises.
You can do more…
Whether you opt for a hybrid-cloud service model or to transition all your data to the cloud, you cannot outsource your responsibility to safeguard your data. Laws such as HIPAA, for example, require business associate contracts. Also, encryption notwithstanding, there is no substitute for password security.
Finally, one excellent strategy for data storage and backup is to have a second, locally accessible backup. That approach offers the obvious advantages of even more redundancy and quicker recovery. It also has the advantage of demonstrating full compliance through off-site redundancy in the case of natural disaster.
…and we can help.
403Tech Inc is the trusted choice when it comes to staying ahead of the latest information technology tips, tricks and news. We can be your resource for the best off-site storage and security. Contact us at (403) 215-7506 or send us an email at [email protected] for more information.
Scott Gallupe of 403Tech Discusses Cybersecurity Threats in Business in Calgary Article
The COVID-19 pandemic sent businesses scrambling to pivot from an office-based environment to a remote workforce. A recent issue of Business in Calgary featured 403Tech President Scott Gallupe, who advised on how local businesses can protect their IT systems from cybersecurity threats. He explained that passwords and video collaboration tools are possible entryways for viruses and malware. The article, Alright, Stop, Collaborate and Listen, features several local IT leaders, describes the issues faced by business owners during the pandemic and provides guidance on ways to protect business data from ransomware and other types of cyberattacks.