Step 3 Step 4 Check Your Provider's Stance on Privacy Audit Your Files and Remove or Encrypt and Encryption Sensitive Data Is If there's anything you'd hate to lose, or any- Secure? Next, do a little digging to see how your thing you're worried an overzealous algo- cloud storage service handles privacy, and rithm may close your account over, it's time how committed they are to protecting your to either remove it from the cloud and store data. We touched on this a while ago for it locally, or encrypt it. some of the most popular services, but not Encrypting those files and archives with a all of them. password may make it more of a hassle to Check what access your provider gives itself access on other devices, especially on your to your data. Review the security they claim smartphone or tablet, but it's a huge security to offer as well. Some companies encrypt boost, especially if you use your cloud ser- your data at rest on their servers, and note vice for things like financial documents, that even they have no idea what you're stor- contracts, or...anything else. ing with them. Others reserve the right to access your data Step 5 whenever they choose, and use vague, hand- Consider Diversifying with Privacy- and wavy terms like "bank level security" when Security-Conscious Services they talk about encryption.

Those are all bad signs, and generally mean Spread out your critical data to different ser- that they either don't take security seriously, vices so if one of them gets hacked, loses or don't think you're smart enough to. your data, or something else happens, you're What do the not at a complete loss. Doing this accomplishes two major things: providers offer •First, it makes sure that losing one cloud concerning Security storage service isn't the end of the world when it comes to you actually being able to of my Data? function. •Second, it protects you from losing every- thing if someone breaks into your account via social engineering, as opposed to pass- CITY OF MEMPHIS INFORMATION SERVICES DIVISION word trickery or exploits. Securing Cloud Storage: Step 1 Step 2 Cloud Storage Check Your Password and Enable Two Factor Audit Your Connected Apps, Devices, Authentication (If Available) and Services Whether your files are stored on , iCloud, or Mega, they could do with a Basic - check the passwords you use for your Look at any connected apps and devices little more security. It's impossible to make cloud accounts. with access to your cloud storage. In them "hack proof," but there are a few Dropbox, for example, you can see all of things you can do to make your data as •Are you using the same ones for multiple ser- them in your account security settings. secure as possible—and still convenient to vices? (Alternatively, log in to your Dropbox ac- access. Let's walk through those steps. •Are you relying on memory or some other clev- er tricks to help you keep track of them? count, click your name and select There's no such thing as perfect security, "Settings." Then click the "Security" tab.) but that's no excuse to do nothing, Stop now, ensure you create a unique and specif- Similarly, at , you can click here to go especially when boosting your security is to your settings, log in, then click the easy. Don't fall for the trope that "if you ic password that is hard to crack even for the Hackers out there. It must be a different pass- "security" tab to enable two-factor authen- want it secure you shouldn't store it in the tication and review your connected apps. cloud." Cloud storage is a convenient, word from the others and has to be something If there are any applications listed that you accessible technology that gives us access you know and can identify with. No less than 12 to our data anywhere, on multiple devices. characters at least. no longer use or don't recognize, remove them. It helps us work and makes our lives easier. Next, enable two factor authentication for all of There's a line to be sure, but it's silly to not them if you can. Two-factor authentication isn't It's not too late in the season to do a little use useful technologies simply because of spring cleaning, and even if you've… the risk that something bad might happen. foolproof, but it's the next most important step to securing your accounts—and by proxy, your da- While you're at it, make sure any old de- ta. vices you use are cleaned out as well. Take special care with this step though— While you're in your password settings, take a if there are files on those devices you want look at your security questions, and how the ser- to keep, they'll be immediately unlinked vice handles password resets. and stop syncing, and the next time the Make sure you'll be notified if someone tries to device calls home, your local copies of reset your password, and if there are security synced files may be deleted. questions involved, make sure you choose ob- scure questions. Lie or give creative answers to those questions that only you know.