{"id":236323,"date":"2021-06-29T08:49:00","date_gmt":"2021-06-29T08:49:00","guid":{"rendered":"https:\/\/www.prominic.net\/?p=236323"},"modified":"2023-03-28T19:09:14","modified_gmt":"2023-03-28T19:09:14","slug":"how-to-ensure-data-privacy-in-cloud","status":"publish","type":"post","link":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","title":{"rendered":"How to ensure data privacy in the cloud"},"content":{"rendered":"\n\n[et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.9.2″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″]

Keeping company data private and secure while operating in the cloud is the question that has been increasingly one of the primary concerns for organizations, especially since the pandemic has made us all work from home a lot, often with less than secure systems.<\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”]

\n

What is data privacy and data security?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Most articles written about data privacy and data security are all about the risk that the new technologies might pose. Those terms are sometimes used interchangeably. But are they really the same?<\/span><\/p>\n

\n

First, let\u2019s talk about data security. There is a difference between data protection and data security. Data protection consists of the strategies and processes that we use to ensure the privacy and integrity of data.\u00a0<\/span><\/p>\n

\n

Each company needs to have a data protection strategy in order to make sure that data is collected, handled and stored in a certain way which prevents foul play. The purpose of a data protection strategy is ensuring that data loss, theft and corruption does not happen. Also, this strategy needs to ensure there is a damage control plan: if the disaster happens how do you proceed in order to minimize loss and damage.\u00a0<\/span><\/p>\n

\n

On the other hand, data privacy refers to the way the data has to be collected with considerations for sensitivity and importance. The concept of data privacy is mostly used when referring to personal health info and personally identifiable information (financial info, medical records, social security number, contact info).<\/span><\/p>\n

\n

The importance of data privacy resides in how you store and work with the sensitive information that your organization needs to handle, be it customer, shareholder or employee info.\u00a0<\/span><\/p>\n

\n

Data privacy is what makes sure that all the sensitive data is only accessible to approved users only. The data privacy strategy needs to ensure that important data is also protected from malicious attacks, and that the organization is meeting all regulatory requirements.<\/span><\/p>\n

\n

Also worth taking into consideration is the fact that data privacy is enforced by data protection regulations, so you need to be careful with\u00a0 following them in order to avoid monetary fines.\u00a0<\/span><\/p>\n

\n

We are tempted to assume that Data Protection and Data Privacy are one and the same but one addresses policies and the other mechanisms.<\/span><\/p>\n

\n

Data privacy handles who has access to data while data protection has applied those restrictions as a target. <\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”]

\n

Do breaches happen all that often?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Sadly, the answer is yes. A lot more often than we would like to admit in all honesty. Last year only there have been a number of data breaches that lead to considerable losses.<\/span><\/p>\n

According to the <\/span>Enduring from Home: COVID-19\u2019s Impact on Business Security<\/span><\/a> report by Malwarebytes up to 20% of last year\u2019s data breaches were determined by remote workers.<\/span><\/p>[\/et_pb_text][et_pb_image src=”https:\/\/www.prominic.net\/wp-content\/uploads\/2021\/06\/COVID-19-Impact-on-Business-Security.png” alt=”COVID-19 Impact on Business Security” title_text=”COVID-19 Impact on Business Security” _builder_version=”4.9.4″ _module_preset=”default”][\/et_pb_image][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

However, it is not only working remotely on the mass scale that lead to multiple data breaches.\u00a0<\/span><\/p>\n

\n

One of the worst<\/span> data leaks<\/span><\/a> of last year was due to a misconfigured database, which led to\u00a0 the social media data of nearly 235 million users from some of the most popular social media sites (Instagram, TikTok and YouTube) being exposed.\u00a0<\/span><\/p>\n

\n

Kids’ games are also not safe. A <\/span>security breach<\/span><\/a> in an online game led to 46 million records being leaked. The weak point was the internal communication system from which a secret key was retrieved which allowed access to the company\u2019s user database. The leaked data were then published on a forum.\u00a0<\/span><\/p>\n

\n

A report issued by IBM and the Ponemon Institute Cost of a Data Breach report 2020, for which 3200 IT and security professionals working for 524 organizations in 17 countries and regions were interviewed, the global average cost of a data breach reached $3.86 million\/breach in 2020.<\/span><\/p>[\/et_pb_text][et_pb_image src=”https:\/\/www.prominic.net\/wp-content\/uploads\/2021\/06\/Cost-of-a-Data-Breach-Report-2020.png” alt=”Cost of a Data Breach Report 2020″ title_text=”Cost of a Data Breach Report 2020″ _builder_version=”4.9.4″ _module_preset=”default”][\/et_pb_image][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Image source<\/span><\/a>.<\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”]

\n

What to do to ensure your cloud is secure?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Encryption<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Encryption is fundamental when talking about data privacy. And we are not only talking about at-rest encryption but also in-transit one as well. This is why you need to make sure you are using a great tool to encrypt your data.\u00a0<\/span><\/p>\n

\n

One great option you can go with is having a Domino server.\u00a0 Your server is one critical resource to secure. A Domino server helps you with this endeavour as it has the option of specifying which users and servers have access to the server and restrict activities on the server — for example, you can restrict who can create new replicas and use pass-through connections.<\/span><\/p>\n

\n

One thing to keep in mind if you set up servers for Internet\/Intranet access is setting up SSL and name-and-password authentication to secure network data transmitted over the network and to authenticate servers and clients.<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Data Storage<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Cloud platforms are convenient for companies because you get flexible storage space without having to invest in hardware and IT staff to manage it. The thing to take into consideration is that you need to make sure that data is properly encrypted. Also, if you know you handle sensitive data, whether your own or your customers\u2019 you will also need to analyze if you want that data held into a public cloud or maybe opt for a private cloud, which is a more secure option.\u00a0<\/span><\/p>\n

\n

Just because your data is not on-prem, or even more so because your data is not on your own servers you need to make sure that you use a service which offers you the level of data privacy both needed and legislated.<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Infrastructure<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

The way your cloud infrastructure looks is highly influenced by what you keep in it. If you use cloud just as a storing space for documents you will have a pretty straightforward approach.\u00a0<\/span><\/p>\n

 <\/p>\n

If you have a SaaS in the cloud you will need different layers of security, be it encryption, passwords, allow lists, deny lists, anti-viruses and so on. In that case, an out of the box solution might not be effective enough, so you will need the help of experts to guide you through the process and ensure that you are doing what needs to be done to ensure your data is protected. <\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Access<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

The third pillar of a secure cloud environment is Access.\u00a0 A recent <\/span>2020 Verizon Data Breach Investigations Report<\/span><\/a>, points out that up to 60% of data breaches happen due to privilege abuse. So knowing who can access and what is key in making sure that your data is handled in a secure way.\u00a0<\/span><\/p>\n

 <\/p>\n

The strength of the passwords your employees use is also of significant importance. Make sure that all the passwords that are used are as secure as possible and take into consideration using 2-factor authentication.<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

Monitoring<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

When it comes to monitoring there are providers who choose to use a third party solution. Some companies, like Prominic.NET for instance, opt for developing monitoring tools in-house.\u00a0<\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”]

\n

All put together<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]

All the steps listed above are sound basics to get started with in keeping your data private and secure. At the end of the day though, the most important thing to remember is that there isn\u2019t one ready solution for every company\u2019s needs and existing tech. That means you need to rely on internal security experts in evaluating cloud solutions. In absence of those, you will need to either make sure that the cloud provider you choose actually specializes in hosting the specific tech you have or need, or you will need to hire a third-party expert to guide you through the evaluation and \/ or implementation process.\u00a0<\/span><\/p>\n

\n

Here at Prominic we pride ourselves on following all the best practices for ensuring data privacy in the cloud.\u00a0<\/span><\/p>\n

\n

We are not only Domino experts, thus being able to provide you one of the most secure platforms there is, but we ensure that your data is where you want it to be at all times.<\/span><\/p>\n

\n

When it comes to secure infrastructure, Prominic.NET has our very own enterprise-grade data centers in the USA. Our geographical location in Southern IL allows us to provide our customers protection from some of the weather, climate, and seismic events that regularly affect both US coasts.\u00a0<\/span><\/p>\n

\n

The partnership we have with Equinix also means that if you want your data stored in a EU based data center we can accommodate that for you as well.<\/span><\/p>\n

\n

The most important thing is that you need to know where your data resides and if it is being mined in any way, and whether your cloud provider is your competitor through their many global investments.<\/span><\/p>\n

\n

Prominic only does one thing: hosting. We have prided ourselves on meeting our customers\u2019 needs through different technology stacks while respecting their right to data ownership and privacy.<\/span><\/p>\n

If you have any questions regarding your data security needs, we\u2019re happy to <\/span>help<\/span><\/a>.<\/span><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n","protected":false},"excerpt":{"rendered":"

Keeping company data private and secure while operating in the cloud is the question that has been increasingly one of the primary concerns for organizations, especially since the pandemic has made us all work from home a lot, often with less than secure systems. What is data privacy and data security? Most articles written about […]<\/p>\n","protected":false},"author":27,"featured_media":235101,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[63,30,142,151],"tags":[],"class_list":["post-236323","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-practices","category-cloud","category-compliance","category-cybersecurity"],"yoast_head":"\nHow to ensure data privacy in the cloud - Prominic.NET<\/title>\n<meta name=\"description\" content=\"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to ensure data privacy in the cloud\" \/>\n<meta property=\"og:description\" content=\"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Prominic.NET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Prominic\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T08:49:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-28T19:09:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"433\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Raluca Robu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@prominic\" \/>\n<meta name=\"twitter:site\" content=\"@prominic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raluca Robu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\"},\"author\":{\"name\":\"Raluca Robu\",\"@id\":\"https:\/\/wordpress.prominic.net\/#\/schema\/person\/0a78f34551bd83590cb250875be1cb94\"},\"headline\":\"How to ensure data privacy in the cloud\",\"datePublished\":\"2021-06-29T08:49:00+00:00\",\"dateModified\":\"2023-03-28T19:09:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\"},\"wordCount\":3559,\"publisher\":{\"@id\":\"https:\/\/wordpress.prominic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg\",\"articleSection\":[\"Business Practices\",\"Cloud | Blog\",\"Compliance\",\"Cybersecurity | Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\",\"url\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\",\"name\":\"How to ensure data privacy in the cloud - Prominic.NET\",\"isPartOf\":{\"@id\":\"https:\/\/wordpress.prominic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg\",\"datePublished\":\"2021-06-29T08:49:00+00:00\",\"dateModified\":\"2023-03-28T19:09:14+00:00\",\"description\":\"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage\",\"url\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg\",\"contentUrl\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg\",\"width\":900,\"height\":433},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wordpress.prominic.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to ensure data privacy in the cloud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wordpress.prominic.net\/#website\",\"url\":\"https:\/\/wordpress.prominic.net\/\",\"name\":\"Prominic.NET\",\"description\":\"Own Your Data Hosted by Prominic\",\"publisher\":{\"@id\":\"https:\/\/wordpress.prominic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wordpress.prominic.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/wordpress.prominic.net\/#organization\",\"name\":\"Prominic.NET\",\"alternateName\":\"Prominic\",\"url\":\"https:\/\/wordpress.prominic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wordpress.prominic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/05\/Prominic-logo-transparent.jpg\",\"contentUrl\":\"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/05\/Prominic-logo-transparent.jpg\",\"width\":900,\"height\":371,\"caption\":\"Prominic.NET\"},\"image\":{\"@id\":\"https:\/\/wordpress.prominic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Prominic\/\",\"https:\/\/x.com\/prominic\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/wordpress.prominic.net\/#\/schema\/person\/0a78f34551bd83590cb250875be1cb94\",\"name\":\"Raluca Robu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wordpress.prominic.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3f7a4f9c84492e861ac22eb4cc8f5676?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3f7a4f9c84492e861ac22eb4cc8f5676?s=96&d=mm&r=g\",\"caption\":\"Raluca Robu\"},\"url\":\"https:\/\/wordpress.prominic.net\/author\/raluca\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to ensure data privacy in the cloud - Prominic.NET","description":"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","og_locale":"en_US","og_type":"article","og_title":"How to ensure data privacy in the cloud","og_description":"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.","og_url":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","og_site_name":"Prominic.NET","article_publisher":"https:\/\/www.facebook.com\/Prominic\/","article_published_time":"2021-06-29T08:49:00+00:00","article_modified_time":"2023-03-28T19:09:14+00:00","og_image":[{"width":900,"height":433,"url":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg","type":"image\/jpeg"}],"author":"Raluca Robu","twitter_card":"summary_large_image","twitter_creator":"@prominic","twitter_site":"@prominic","twitter_misc":{"Written by":"Raluca Robu","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#article","isPartOf":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/"},"author":{"name":"Raluca Robu","@id":"https:\/\/wordpress.prominic.net\/#\/schema\/person\/0a78f34551bd83590cb250875be1cb94"},"headline":"How to ensure data privacy in the cloud","datePublished":"2021-06-29T08:49:00+00:00","dateModified":"2023-03-28T19:09:14+00:00","mainEntityOfPage":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/"},"wordCount":3559,"publisher":{"@id":"https:\/\/wordpress.prominic.net\/#organization"},"image":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg","articleSection":["Business Practices","Cloud | Blog","Compliance","Cybersecurity | Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","url":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","name":"How to ensure data privacy in the cloud - Prominic.NET","isPartOf":{"@id":"https:\/\/wordpress.prominic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage"},"image":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg","datePublished":"2021-06-29T08:49:00+00:00","dateModified":"2023-03-28T19:09:14+00:00","description":"How to ensure data privacy in cloud. Make sure you secure your data is secure and you are safe from data breaches.","breadcrumb":{"@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#primaryimage","url":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg","contentUrl":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/03\/Domino-Application-Strategy.jpg","width":900,"height":433},{"@type":"BreadcrumbList","@id":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wordpress.prominic.net\/"},{"@type":"ListItem","position":2,"name":"How to ensure data privacy in the cloud"}]},{"@type":"WebSite","@id":"https:\/\/wordpress.prominic.net\/#website","url":"https:\/\/wordpress.prominic.net\/","name":"Prominic.NET","description":"Own Your Data Hosted by Prominic","publisher":{"@id":"https:\/\/wordpress.prominic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wordpress.prominic.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wordpress.prominic.net\/#organization","name":"Prominic.NET","alternateName":"Prominic","url":"https:\/\/wordpress.prominic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wordpress.prominic.net\/#\/schema\/logo\/image\/","url":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/05\/Prominic-logo-transparent.jpg","contentUrl":"https:\/\/wordpress.prominic.net\/wp-content\/uploads\/2021\/05\/Prominic-logo-transparent.jpg","width":900,"height":371,"caption":"Prominic.NET"},"image":{"@id":"https:\/\/wordpress.prominic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Prominic\/","https:\/\/x.com\/prominic"]},{"@type":"Person","@id":"https:\/\/wordpress.prominic.net\/#\/schema\/person\/0a78f34551bd83590cb250875be1cb94","name":"Raluca Robu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wordpress.prominic.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3f7a4f9c84492e861ac22eb4cc8f5676?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3f7a4f9c84492e861ac22eb4cc8f5676?s=96&d=mm&r=g","caption":"Raluca Robu"},"url":"https:\/\/wordpress.prominic.net\/author\/raluca\/"}]}},"_links":{"self":[{"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/posts\/236323"}],"collection":[{"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/comments?post=236323"}],"version-history":[{"count":6,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/posts\/236323\/revisions"}],"predecessor-version":[{"id":236837,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/posts\/236323\/revisions\/236837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/media\/235101"}],"wp:attachment":[{"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/media?parent=236323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/categories?post=236323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wordpress.prominic.net\/wp-json\/wp\/v2\/tags?post=236323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}