Got it

Cloud security

Created: Jul 8, 2022 01:58:14Latest reply: Jul 11, 2022 05:03:45 164 4 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

What is the best security application that can protect my cloud data? 

  • x
  • convention:

Featured Answers
Fathy_jr
Created Jul 8, 2022 02:43:56

the top ways to keep your data secure in the cloud:

Set Up Backup And Recovery Options

While technology today is extremely advanced, there is always the possibility of experiencing technical issues, or even user errors. That is why it is extremely important to back up your datasets. Losing the data that your organization depends on can lead to extreme disruption and financial loss, not to mention unhappy customers. Today most systems give you the capability to save multiple versions of your database, allowing you to recover data from certain points in time and giving you peace of mind that you will never be able to lose data in case of a system crash or accidental deletion. Backing up your files means you will never have to worry about losing information essential to your business success.
Encrypt Your Data

Encryption, which is the conversion of information into secret codes, deters hackers from accessing your data in the cloud. Because encryption turns your data into ciphertext, it is much more difficult and takes more time for hackers to understand exactly what they are reading. Only hackers that have advanced cryptography skills would be able to decipher the codes in your database with this in place. Data encryption will add an extra layer of security, ensuring that your data is secure from hackers and other threats.

Set User Permissions

Not everyone in your organization needs access to every bit of data you own. Make sure to set up user permissions based on your organizational hierarchy. This tip is to ensure that staff who are not skilled within certain roles do not accidentally make changes to critical datasets. It seems like a no-brainer, but many companies have made the mistake of having too many or unorganized permissions, which inevitably leads to problems.

Set Up Proper Passwords

System accounts that hold important documents should have difficult passwords. Don't be predictable when creating passwords, because the easier your password is to guess, the faster a hacker can access your accounts. A strong password should have a minimum of 12 characters and should include numbers and symbols, along with both capital and lowercase letters. This goes for encryption as well, which basically sets a password for all your most valuable files so that even if a hacker gets into your database, they won’t be able to access individual datasets. It is recommended that you also use two-factor verification, creating a two-step process every time you log in to add an extra layer of security. Another obvious tip is to be wary that you aren’t saving your passwords to public computers.

Secure End User Devices

Not only is it important to secure your systems, but you must also secure the devices on which you access those systems. This is a simple way to eliminate insider threats. Deploy a firewall solution for your network. Another way to protect your devices is to use a virtual private network (VPN). A VPN creates a private network while connected to public internet services. It provides online privacy, along with encrypted and secure connections to ensure that your data is safe.

Avoid Uploading Confidential Data

Of course, the whole point of the cloud is to view all your data in one spot. But make sure to organize it ahead of time, weeding out your own personal identifiable data and confidential data in case of a possible breach. Also, confirm that there are no files that contain your passwords or other login credentials that would help a hacker easily access the rest of your data.

Run Tests

Most importantly, after you take these precautions, you should run tests on your security system. Analyzing your company's performance with your security setup might show you where to make needed changes. At my company, we hire an external team of hackers to test our systems' security to ensure that our customers' and our data is secure. Keeping your system in the cloud means it most likely will need ongoing maintenance or changes, and tests should be run to confirm that your defense system is operating efficiently.
View more
  • x
  • convention:

All Answers
olive.zhao
olive.zhao Admin Created Jul 8, 2022 02:05:43

Hello, friend!

Cloud data security is the foundation of cloud computing development. All cloud products have security mechanisms at different layers, including the storage layer, network layer, host layer, and application layer.

For example the DSC of Huawei Cloud Stack.

Data Security Center (DSC) is a latest-generation cloud data security management platform that protects your data assets by leveraging its data protection capabilities such as data classification, risk identification, data masking, and watermark-based source tracking. DSC gives you an insight into the security status of each stage in the data security lifecycle and provides constant visibility of the security status of your data assets.

Hope this helps!

View more
  • x
  • convention:

Fathy_jr
Fathy_jr Created Jul 8, 2022 02:43:56

the top ways to keep your data secure in the cloud:

Set Up Backup And Recovery Options

While technology today is extremely advanced, there is always the possibility of experiencing technical issues, or even user errors. That is why it is extremely important to back up your datasets. Losing the data that your organization depends on can lead to extreme disruption and financial loss, not to mention unhappy customers. Today most systems give you the capability to save multiple versions of your database, allowing you to recover data from certain points in time and giving you peace of mind that you will never be able to lose data in case of a system crash or accidental deletion. Backing up your files means you will never have to worry about losing information essential to your business success.
Encrypt Your Data

Encryption, which is the conversion of information into secret codes, deters hackers from accessing your data in the cloud. Because encryption turns your data into ciphertext, it is much more difficult and takes more time for hackers to understand exactly what they are reading. Only hackers that have advanced cryptography skills would be able to decipher the codes in your database with this in place. Data encryption will add an extra layer of security, ensuring that your data is secure from hackers and other threats.

Set User Permissions

Not everyone in your organization needs access to every bit of data you own. Make sure to set up user permissions based on your organizational hierarchy. This tip is to ensure that staff who are not skilled within certain roles do not accidentally make changes to critical datasets. It seems like a no-brainer, but many companies have made the mistake of having too many or unorganized permissions, which inevitably leads to problems.

Set Up Proper Passwords

System accounts that hold important documents should have difficult passwords. Don't be predictable when creating passwords, because the easier your password is to guess, the faster a hacker can access your accounts. A strong password should have a minimum of 12 characters and should include numbers and symbols, along with both capital and lowercase letters. This goes for encryption as well, which basically sets a password for all your most valuable files so that even if a hacker gets into your database, they won’t be able to access individual datasets. It is recommended that you also use two-factor verification, creating a two-step process every time you log in to add an extra layer of security. Another obvious tip is to be wary that you aren’t saving your passwords to public computers.

Secure End User Devices

Not only is it important to secure your systems, but you must also secure the devices on which you access those systems. This is a simple way to eliminate insider threats. Deploy a firewall solution for your network. Another way to protect your devices is to use a virtual private network (VPN). A VPN creates a private network while connected to public internet services. It provides online privacy, along with encrypted and secure connections to ensure that your data is safe.

Avoid Uploading Confidential Data

Of course, the whole point of the cloud is to view all your data in one spot. But make sure to organize it ahead of time, weeding out your own personal identifiable data and confidential data in case of a possible breach. Also, confirm that there are no files that contain your passwords or other login credentials that would help a hacker easily access the rest of your data.

Run Tests

Most importantly, after you take these precautions, you should run tests on your security system. Analyzing your company's performance with your security setup might show you where to make needed changes. At my company, we hire an external team of hackers to test our systems' security to ensure that our customers' and our data is secure. Keeping your system in the cloud means it most likely will need ongoing maintenance or changes, and tests should be run to confirm that your defense system is operating efficiently.
View more
  • x
  • convention:

atadmrl251
atadmrl251 Moderator Created Jul 10, 2022 09:00:52

Posted by Fathy_jr at 2022-07-08 02:43the top ways to keep your data secure in the cloud:Set Up Backup And Recovery OptionsWhile technolog ...

good answer but question is asking application , you should give application name.
Thank you

View more
  • x
  • convention:

RachelGomez
RachelGomez Created Jul 11, 2022 05:03:45

Cloud security is a collection of procedures and technology designed to address external and internal threats to business security. Organizations need cloud security as they move toward their digital transformation strategy and incorporate cloud-based tools and services as part of their infrastructure.In modern-day enterprises, there has been a growing transition to cloud-based environments and IaaS, Paas, or SaaS computing models. The dynamic nature of infrastructure management, especially in scaling applications and services, can bring a number of challenges to enterprises when adequately resourcing their departments. These as-a-service models give organizations the ability to offload many of the time-consuming, IT-related tasks.

Greeting,
Rachel Gomez
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.
Information Protection Guide
Thanks for using Huawei Enterprise Support Community! We will help you learn how we collect, use, store and share your personal information and the rights you have in accordance with Privacy Policy and User Agreement.