Every Day Connected
Cloud Computing 101: Protect Yourself Online
The cloud's features we love most also leave our families vulnerable, but you can use the cloud without compromising your privacy
Cloud computing has certainly made life more convenient. The cloud allows you to back up photos and music in a Web vault, collaborate simultaneously on a document in Texas with a colleague in Tennessee, or buy something online with one click of the mouse.
But if you don't take the proper precautions to protect yourself online, what you gain in convenience from the cloud you may lose in privacy. "People want to be able to access their applications not just from their computer, but from their phones, tablets, etc. And if they're using the same user ID and password everywhere, they're going to run into trouble," says Tom Packert, chief technology officer at CareCloud, a company based in Miami, Fla., that implements cloud-based solutions for medical professionals.
Easy-to-crack passwords are less of a problem thanks to sites like LastPass.com, which make it easy to create virtually unhackable passwords you can actually recall. Use the program to create one master password that better protects all your unique passwords on any website you visit and cloud-based service you use. The site also allows you to test your current passwords to see how secure they really are.
But decodable passwords are only one of many security issues cloud-based computing entails. Here, a look at the different types of Web users that may live in your home, what breaches each is vulnerable to, and the steps you can take to protect your family's personal information.
Family member: The Desktop Surfer
They use the cloud to: Back up files, pay bills, shop online
Malware, which includes viruses, worms, spyware, adware and rootkits. "It's everywhere," says Packert, "so you really shouldn't be doing your banking on the same computer that your entire family uses."
Try OpenDNS , a superfast DNS service that acts as a low-budget firewall to block malware and other harmful bugs from sneaking onto your computer. Webroot also offers antispyware and antivirus protection that is specifically designed to deal with vulnerabilities posed by cloud computing. Meanwhile, Symantec is a software program you can install directly on your PC. Once you've selected your firewalls, install Secunia PSI , a free program that compares all of the software on your computer with updates that are available online and downloads new versions when necessary.
Family member: The Mobile Worker
They use the cloud to: Share documents, videoconference, back up files
Exposing company computers to unsecure networks. "People plug their laptops into their unsecure network at home, then go into the office and log on to the company server," says Packert. Also, since laptops are portable, they're easy to steal -- along with the sensitive data they contain.
"Humans are easy to hack and laptops are easy to steal, so every laptop user should install encryption software," recommends Packert. A program like TrueCrypt will make your data unreadable, so if your machine does get stolen, the thief will have the laptop -- but not the information on it.
Family member: The Social Networker
They use the cloud to: Surf Facebook, MySpace, Twitter, foursquare and Flickr
Since teens are often doing the most social networking in your house, they're also the ones inadvertently giving away confidential information every time they play a game on Facebook, create a user profile or update their status.
Have a talk with your kids about the danger of revealing too much personal information on social networking sites. "It's not your page on Facebook; it's Facebook's page about you," says Packert. Also, make sure your antivirus software is up-to-date.
Family member: The Smartphone Addict
They use the cloud for: GPS tracking, social networking, sharing photos
Security risks: GPS tracking, which many Web-based services now use, can leave you widely vulnerable to security breaches -- even if you did save 10 percent off your bill by "checking in" at your favorite restaurant.
Protection plan: Anytime your phone or tablet asks to track your location, click "Don't Allow," which disables the GPS tracking. Also, if your tablet has the option to encrypt your drive (the Motorola Xoom does, for example), be sure to choose that option. This way, if someone walks away with your tablet, you'll only be out a gadget -- not most of your private information.
Regardless of whether anyone in your family fits one of these profiles, you should be aware of the available security tools to protect yourself online if you use cloud-based computing. As technology gets more sophisticated, so do the hackers and thieves messing with it. Says Packert: "Security breaches can happen to anyone if you're not careful."
Photo Credit: @iStockphoto.com/alexsl
- 4 Strategies to Avert Virtual Arguments
- Cloud Computing 101: Protect Yourself Online
- How to Recover From a Social Media Mistake
- Why You Should Inventory Business Cloud Use
- Emerging Technology Has Positive Impact in Classroom
- 4 Apps to Manage Your Contacts
- Portable Tech Gadgets You Need This Summer
- Best Tablets for Your Business
- Security Tips for Your Smartphone or Tablet
- 5 New Cloud Tools You'll Love
- Can a Tablet Replace Your Laptop?
- Why Wireless Needs a Network of Networks
- 5 Steps to a Successful Enterprise Wireless Strategy
- 5 Keys for Moving Enterprise Security to the Cloud
- Tips for Building and Deploying Cloud-based Apps
- 5 Business Lessons You Can Learn From Mark Zuckerberg
- Russia: The No. 1 Base of Global Internet Attacks
- Researchers Say New Botnet TDL-4 Poses Big Threat
- The Internet Grows Up
- Ten Ways to Keep Your Online Information Secure
- How Facebook and Your Free Time Can Get You Fired
- The Only 10 Android Health Apps You Need
- Connected TV
- Near-Field Communication Technology the Next Big Thing
- The Future of 3-D Video
- Is Your Teen Sexting?
- Should You Ban Your Tweens From Facebook?
- Home Movies: Then and Now
- Is Social Media Malware Infecting Your Business?
- Is Your Tween (Illegally) on Facebook?
- Are Free Public Wi-Fi Networks Safe?
- Explosion of Creativity: Power of Online Communities
- The Future According to Google
- 5 Cheap Alternatives to Hiring a Personal Trainer
- When Your Dream Company is Hiring on Twitter
- Colleges Bring Campuses to Facebook
- Technology Powers Revolutions and Saves Lives
- Best Photo Apps
- Virtual World No Substitute for Real One
- Best Phone Apps for Busy Women
- How to Prevent Identity Theft
- How to Use Facebook So It Does not Use You
- Worst-case Computer Scenarios
- Google Chrome OS Notebook: A Security Game Changer?
- What Is Cloud Computing?
- How to Prevent Data Breaches
- Best Tips for Sharing Videos
- Do You Need an iPad for Your Small Business?
- The App Guide: 5 Must-have Shopping Apps
- Project Management Tips From the Pros
- Finding the Right Skill Set
- Who's Gawking at Your Photos?
- Dealing With Virtual Stalking
- CES 2011 Report - Consumer Electronics Show
- Time to Gear up for 3-D TV?
- How to Get the Best Service From IT Vendors
- Dating Apps: The Lowdown
- New Website Streamlines College-Aid Application
- Gift-card Resale Market Thrives Online
- Stop Cyberbullying Now!
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
Copyright © 2011 Studio One Networks. All rights reserved.