Microage-Kingston-work-from-home-magnification-scaled

Three essential rules for all cloud applications

Cloud users, follow our three essential rules for all your applications!

work-from-home-cloud-applications

If you’re using cloud applications while your employees are working from home, you are justified to be concerned about data privacy and security.  The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. 

Here are a few things you can easily do to improve security in the cloud:

  1. Maintain a STRONG password of at least eight (8) characters with both uppercase and lowercase letters, numbers and symbols.  Do NOT make it easy, such as “Password123!”  While that technically meets the requirements, a hacker could easily crack that. 
  2. Make sure the device you’re using to access the application is secure.  You’ll need professional help installing and maintaining a strong firewall, antivirus and spam-filtering software.  Don’t access your cloud applications with a device you also use to check social media sites and free e-mail accounts. 
  3. Back up your data.  If the data in the cloud is important, make sure you’re downloading it from the application and backing it up to another safe and secure location.  If your account gets hacked OR if the cloud company shuts down your account, you have a copy. 

 With these three essential rules for all cloud applications, its easy to make the security in your company’s cloud better. 

Want more tips for setting up safe Work From Home networks? Check out our free report. Or book a free 15 minute work from home security consultation. 

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

cybersecurity myths banner, mythes cybersécurité

Top 5 Cybersecurity Myths

The digital world has offered small businesses around the world with numerous options for growth and protection. However, it has also allowed myths and lies…

Read More
Microsoft 365 business voice featured

Why you should consider Microsoft 365 Business Voice

A few months ago, Microsoft announced the launch of Microsoft 365 Business Voice.  This product, which seamlessly incorporates cloud-based VoIP technology and cross-device functionality into…

Read More

5 Critical Questions to Ask Your IT Service Provider

Not all service providers are built the same. To find a provider who will meet your needs, ask them these 5 critical questions before you hire them.

Read More
backup security routine

How to Implement a Successful Data Backup Routine

Data backups are absolutely essential for small and large businesses alike to prevent downtime, disruption, and delays. Without smart backup solutions, your company’s information becomes…

Read More
Security requirements Canada

5 Minimum Security Requirements Canadian Businesses Need for 2020

The Canadian Center for Cyber Security recently issued a whitepaper talking about the many steps small businesses need to take to ensure their businesses are…

Read More