{"id":236323,"date":"2021-06-29T08:49:00","date_gmt":"2021-06-29T08:49:00","guid":{"rendered":"https:\/\/www.prominic.net\/?p=236323"},"modified":"2023-03-28T19:09:14","modified_gmt":"2023-03-28T19:09:14","slug":"how-to-ensure-data-privacy-in-cloud","status":"publish","type":"post","link":"https:\/\/wordpress.prominic.net\/how-to-ensure-data-privacy-in-cloud\/","title":{"rendered":"How to ensure data privacy in the cloud"},"content":{"rendered":"\n\n[et_pb_section fb_built=”1″ _builder_version=”3.22″][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.9.2″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″]
Keeping company data private and secure while operating in the cloud is the question that has been increasingly one of the primary concerns for organizations, especially since the pandemic has made us all work from home a lot, often with less than secure systems.<\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”] Most articles written about data privacy and data security are all about the risk that the new technologies might pose. Those terms are sometimes used interchangeably. But are they really the same?<\/span><\/p>\n \n First, let\u2019s talk about data security. There is a difference between data protection and data security. Data protection consists of the strategies and processes that we use to ensure the privacy and integrity of data.\u00a0<\/span><\/p>\n \n Each company needs to have a data protection strategy in order to make sure that data is collected, handled and stored in a certain way which prevents foul play. The purpose of a data protection strategy is ensuring that data loss, theft and corruption does not happen. Also, this strategy needs to ensure there is a damage control plan: if the disaster happens how do you proceed in order to minimize loss and damage.\u00a0<\/span><\/p>\n \n On the other hand, data privacy refers to the way the data has to be collected with considerations for sensitivity and importance. The concept of data privacy is mostly used when referring to personal health info and personally identifiable information (financial info, medical records, social security number, contact info).<\/span><\/p>\n \n The importance of data privacy resides in how you store and work with the sensitive information that your organization needs to handle, be it customer, shareholder or employee info.\u00a0<\/span><\/p>\n \n Data privacy is what makes sure that all the sensitive data is only accessible to approved users only. The data privacy strategy needs to ensure that important data is also protected from malicious attacks, and that the organization is meeting all regulatory requirements.<\/span><\/p>\n \n Also worth taking into consideration is the fact that data privacy is enforced by data protection regulations, so you need to be careful with\u00a0 following them in order to avoid monetary fines.\u00a0<\/span><\/p>\n \n We are tempted to assume that Data Protection and Data Privacy are one and the same but one addresses policies and the other mechanisms.<\/span><\/p>\n \n Data privacy handles who has access to data while data protection has applied those restrictions as a target. <\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”] Sadly, the answer is yes. A lot more often than we would like to admit in all honesty. Last year only there have been a number of data breaches that lead to considerable losses.<\/span><\/p>\n According to the <\/span>Enduring from Home: COVID-19\u2019s Impact on Business Security<\/span><\/a> report by Malwarebytes up to 20% of last year\u2019s data breaches were determined by remote workers.<\/span><\/p>[\/et_pb_text][et_pb_image src=”https:\/\/www.prominic.net\/wp-content\/uploads\/2021\/06\/COVID-19-Impact-on-Business-Security.png” alt=”COVID-19 Impact on Business Security” title_text=”COVID-19 Impact on Business Security” _builder_version=”4.9.4″ _module_preset=”default”][\/et_pb_image][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”] However, it is not only working remotely on the mass scale that lead to multiple data breaches.\u00a0<\/span><\/p>\n \n One of the worst<\/span> data leaks<\/span><\/a> of last year was due to a misconfigured database, which led to\u00a0 the social media data of nearly 235 million users from some of the most popular social media sites (Instagram, TikTok and YouTube) being exposed.\u00a0<\/span><\/p>\n \n Kids’ games are also not safe. A <\/span>security breach<\/span><\/a> in an online game led to 46 million records being leaked. The weak point was the internal communication system from which a secret key was retrieved which allowed access to the company\u2019s user database. The leaked data were then published on a forum.\u00a0<\/span><\/p>\n \n A report issued by IBM and the Ponemon Institute Cost of a Data Breach report 2020, for which 3200 IT and security professionals working for 524 organizations in 17 countries and regions were interviewed, the global average cost of a data breach reached $3.86 million\/breach in 2020.<\/span><\/p>[\/et_pb_text][et_pb_image src=”https:\/\/www.prominic.net\/wp-content\/uploads\/2021\/06\/Cost-of-a-Data-Breach-Report-2020.png” alt=”Cost of a Data Breach Report 2020″ title_text=”Cost of a Data Breach Report 2020″ _builder_version=”4.9.4″ _module_preset=”default”][\/et_pb_image][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”] Image source<\/span><\/a>.<\/span><\/p>[\/et_pb_text][et_pb_text quote_border_weight=”14px” quote_border_color=”#811937″ _builder_version=”4.9.4″ link_font=”||||||||” quote_font=”|700|||||||” quote_text_color=”#000000″ quote_font_size=”18px” quote_line_height=”1.8em” header_font=”||||||||” header_2_font=”|700|||||||” header_2_font_size=”25px” header_2_line_height=”1.5em” max_width=”700px” max_width_tablet=”” max_width_phone=”” max_width_last_edited=”on|tablet” header_2_font_size_tablet=”30px” header_2_font_size_phone=”15px” header_2_font_size_last_edited=”on|desktop” locked=”off” header_font_size__hover=”30px” header_font_size__hover_enabled=”30px” header_letter_spacing__hover=”0px” header_letter_spacing__hover_enabled=”0px” header_text_shadow_style__hover=”none” header_text_shadow_style__hover_enabled=”none” header_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_2_font_size__hover=”26px” header_2_font_size__hover_enabled=”26px” header_2_letter_spacing__hover=”0px” header_2_letter_spacing__hover_enabled=”0px” header_2_line_height__hover=”1em” header_2_line_height__hover_enabled=”1em” header_2_text_shadow_style__hover=”none” header_2_text_shadow_style__hover_enabled=”none” header_2_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_2_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_3_font_size__hover=”22px” header_3_font_size__hover_enabled=”22px” header_3_letter_spacing__hover=”0px” header_3_letter_spacing__hover_enabled=”0px” header_3_line_height__hover=”1em” header_3_line_height__hover_enabled=”1em” header_3_text_shadow_style__hover=”none” header_3_text_shadow_style__hover_enabled=”none” header_3_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_3_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_4_font_size__hover=”18px” header_4_font_size__hover_enabled=”18px” header_4_letter_spacing__hover=”0px” header_4_letter_spacing__hover_enabled=”0px” header_4_line_height__hover=”1em” header_4_line_height__hover_enabled=”1em” header_4_text_shadow_style__hover=”none” header_4_text_shadow_style__hover_enabled=”none” header_4_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_4_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_5_font_size__hover=”16px” header_5_font_size__hover_enabled=”16px” header_5_letter_spacing__hover=”0px” header_5_letter_spacing__hover_enabled=”0px” header_5_line_height__hover=”1em” header_5_line_height__hover_enabled=”1em” header_5_text_shadow_style__hover=”none” header_5_text_shadow_style__hover_enabled=”none” header_5_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_5_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” header_6_font_size__hover=”14px” header_6_font_size__hover_enabled=”14px” header_6_letter_spacing__hover=”0px” header_6_letter_spacing__hover_enabled=”0px” header_6_line_height__hover=”1em” header_6_line_height__hover_enabled=”1em” header_6_text_shadow_style__hover=”none” header_6_text_shadow_style__hover_enabled=”none” header_6_text_shadow_color__hover=”rgba(0,0,0,0.4)” header_6_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)” text_letter_spacing__hover=”0px” text_letter_spacing__hover_enabled=”0px” text_text_shadow_style__hover=”none” text_text_shadow_style__hover_enabled=”none” text_text_shadow_color__hover=”rgba(0,0,0,0.4)” text_text_shadow_color__hover_enabled=”rgba(0,0,0,0.4)”] Encryption is fundamental when talking about data privacy. And we are not only talking about at-rest encryption but also in-transit one as well. This is why you need to make sure you are using a great tool to encrypt your data.\u00a0<\/span><\/p>\n \n One great option you can go with is having a Domino server.\u00a0 Your server is one critical resource to secure. A Domino server helps you with this endeavour as it has the option of specifying which users and servers have access to the server and restrict activities on the server — for example, you can restrict who can create new replicas and use pass-through connections.<\/span><\/p>\n \n One thing to keep in mind if you set up servers for Internet\/Intranet access is setting up SSL and name-and-password authentication to secure network data transmitted over the network and to authenticate servers and clients.<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”] Cloud platforms are convenient for companies because you get flexible storage space without having to invest in hardware and IT staff to manage it. The thing to take into consideration is that you need to make sure that data is properly encrypted. Also, if you know you handle sensitive data, whether your own or your customers\u2019 you will also need to analyze if you want that data held into a public cloud or maybe opt for a private cloud, which is a more secure option.\u00a0<\/span><\/p>\n \n Just because your data is not on-prem, or even more so because your data is not on your own servers you need to make sure that you use a service which offers you the level of data privacy both needed and legislated.<\/span><\/p>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”] The way your cloud infrastructure looks is highly influenced by what you keep in it. If you use cloud just as a storing space for documents you will have a pretty straightforward approach.\u00a0<\/span><\/p>\n <\/p>\n\n
What is data privacy and data security?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
\n
Do breaches happen all that often?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
\n
What to do to ensure your cloud is secure?<\/span><\/h2>\n<\/blockquote>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
Encryption<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
Data Storage<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]
Infrastructure<\/span><\/h3>[\/et_pb_text][et_pb_text _builder_version=”4.9.4″ _module_preset=”default”]