Microage-Kingston-work-from-home-magnification-scaled

Three essential rules for all cloud applications

Cloud users, follow our three essential rules for all your applications!

work-from-home-cloud-applications

If you’re using cloud applications while your employees are working from home, you are justified to be concerned about data privacy and security.  The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. 

Here are a few things you can easily do to improve security in the cloud:

  1. Maintain a STRONG password of at least eight (8) characters with both uppercase and lowercase letters, numbers and symbols.  Do NOT make it easy, such as “Password123!”  While that technically meets the requirements, a hacker could easily crack that. 
  2. Make sure the device you’re using to access the application is secure.  You’ll need professional help installing and maintaining a strong firewall, antivirus and spam-filtering software.  Don’t access your cloud applications with a device you also use to check social media sites and free e-mail accounts. 
  3. Back up your data.  If the data in the cloud is important, make sure you’re downloading it from the application and backing it up to another safe and secure location.  If your account gets hacked OR if the cloud company shuts down your account, you have a copy. 

 With these three essential rules for all cloud applications, its easy to make the security in your company’s cloud better. 

Want more tips for setting up safe Work From Home networks? Check out our free report. Or book a free 15 minute work from home security consultation. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

cybersecurity banner

3 Reasons To Trust MicroAge With Your Cybersecurity

Cybersecurity has always been a concern for businesses, but the threats we all face are only expected to increase. By 2020, the average cost of…

Read More

How-to Spot a Phishing Email

Even though most business are taking time off due to covid-19, hacker's aren't! Learn how to spot a legitimate email from a fake one. Read more here!

Read More

Intimidation Tactics: Ransomware Cyber Gangs Now Call Their Victims

Cyber gangs use a number of tactics to intimidate their targets into paying their ransoms. Victims are often threatened or blackmailed via email into doing…

Read More

Has Your IT Service Provider Changed as Your Needs Have Changed?

There is no arguing with the fact that the COVID-19 pandemic has forced businesses to adjust and change the way they do business. Some of…

Read More
cloud data back up

5 Reasons Your Company Should Use the Cloud for Data Backups

From emails with malicious files to zero-day vulnerabilities, the risks to business data are everywhere. An excellent strategy to prevent information loss and protect your…

Read More