INSIGHT 01: Securing Your Data in the Cloud | SYNEXTRA

Chris Piggott

INSIGHT 01: Securing Your Data in the Cloud

In this series “INSIGHT: The Technical Director’s Perspective” I’ll share my years of hands-on experience to demystify the Cloud and help you gain control over your IT roadmap.

In this intro to the series, Chris shares 5 actionable tips to help you achieve higher levels of Cloud data security.

Short on time? Watch the 30 second overview instead.

Use Two-Factor Authentication:

A Two-Factor (2FA) solution uses App or SMS verification to prevent malicious access. With 2FA enabled, you’ll have to use an application or input a code sent via SMS to gain access to a secure system. 2FA protects against malicious access, even if your login credentials fall into the wrong hands.

Two-Factor also protects your business from insider threats. Threats such as careless employees choosing to ignore company policy and use a weak password because it’s easier to remember. However, these easy to remember passwords are also easy to guess and easy to crack with brute force attacks. Did you know that a shocking 25% of respondents in a survey by Troy Hunt use a word that can be found in the Oxford dictionary, such as ‘password’.

Strong Passwords are Critical:

Compromised passwords were the common denominator in the biggest 2017 breaches, including Yahoo!’s 3 billion customers, Equifax, Uber, and more. Users can compromise passwords just by sharing them with colleagues. Users can even leak passwords by using the same one to access work and non-work-related systems, such as Facebook or a website. Therefore, your organisation needs a strong password policy.

Strong passwords contain at least 10 characters, are not words that can be found in the dictionary (see why above) and include a number and a special character. For added measure, use a mixture of capital and lowercase letters.

Read “5 Ways to Create Strong Passwords You’ll Never Forget” to create the building blocks of a strong password policy.

Create a DR plan:

It’s easy to forget that an off-site back-up alone doesn’t cover you if a server fails. Create an achievable DR plan that focusses on bringing up mission-critical servers in a realistic time frame. Consider using a Disaster Recovery-as-a-Service (DRaaS) solution that allows you to replicate VMs and spin them up in the Cloud in minutes to avoid prolonged downtime.

Something important to note about DRaaS is that not all solutions are the same. The difference lies in the degree of self-management required to maintain them. Whether that’s configuring the solution, initiating recoveries or performing failover tests. Managed DRaaS solutions take away the majority of these requirements and will in most cases regularly test failovers – complete with results. This ensures the solution is fully operational and delivers value for your business.

blueprint-secure-cloud-data

Download this helpful infographic here

Configure Secure Backups:

Industry analysts such as Gartner, Forrester and Aberdeen are constantly highlighting the rising costs of downtime on today’s increasingly data-dependent businesses. The cost of downtime can be calculated in various ways, but in most cases, it can cost a small organisation thousands of pounds for every hour of downtime. This can rise to tens of thousands of pounds for mid-size organisations.

Therefore, nightly backups are not sufficient enough to protect your business. Make sure to backup at regular intervals that are tolerable for your business. Whether that’s by the second, minute or hour.

Also, adhere to the 3-2-1 rule. Keep 3 copies, in two different formats and at least 1 offsite. Make sure nobody can access these backups and that they are encrypted.

Data Encryption at Rest:

Most Cloud solutions offer encryption during transit but, encrypting data at rest is just as important. The best practice is to utilise a blanket approach and encrypt all data and devices at all times. As a minimum, your organisation should be using SHA128 encryption, but we highly recommend configuring SHA256 encryption for added security and future interoperability.

Conclusion

There are many steps you will need to take achieve a high level of Cloud Data Security. And no single step will guarantee security. However, by following the industry best practices in this guide, you can help protect your business from the growing threat of a data breach.

Signup below to receive the rest of the series “INSIGHT: The Technical Director’s Perspective” straight to your inbox. Get more actionable advice and hands-on experience once a week, directly in the body of each email.

KEEP UP TO DATE

With rapid growth, we are also expanding our UK footprint. Sign up for our newsletter to find out when we are opening a datacentre location near you, along with helpful guides and important company announcements.