In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
This article focuses on "what are the techniques for keeping personal cloud data storage secure in the server?" interested friends may wish to take a look. The method introduced in this paper is simple, fast and practical. Let's let the editor take you to learn "what are the techniques for keeping personal cloud data storage secure on the server?"
1. Use strong passwords and two-factor authentication
All standard security tips also apply to your cloud account: choose long and unique hard-to-guess passwords and use the password manager. Keep your passwords secret and secure, and beware of any messages that try to get you to give them up (for example, an unexpected email).
If possible, it is recommended to enable two-factor authentication (2FA, which is now supported by most popular cloud storage services). Enabling 2FA means that unwelcome visitors will not be able to access your cloud storage files, even if they know your username and password, which means they need to get another code from your phone.
two。 Review file and folder sharing
Cloud storage services are ideal for sharing files with others, such as family members and co-workers, but if others find these links or manage to access the accounts of the people with whom you share files, it may allow your data to be opened by unauthorized access. Be careful of the people who share files and folders with you, and if these features are available, add passwords and expiration dates to the share.
It's also a good idea to review all currently active shares on your account regularly-for example, on the Dropbox web interface, click the share button on the left.
3. Clear your deleted files
Many cloud storage services run things like the Recycle Bin, saving deleted files for days or weeks in case you want them back, which is often very useful and may allow you to make sure that some sensitive files are completely deleted and can no longer be recovered.
If you are deleting files that you absolutely don't want to retrieve and don't want anyone else to find them, use the service's "anti-delete" option to make sure the files are really, really gone. For example, on iCloud on the Internet, you can click on the most recently deleted link to view and permanently delete files.
4. Check the applications and accounts you are connected to
Even if hackers can't access your account through the front door, they may try to get in through a side window-in other words, through another account connected to your cloud storage. For example, while it's convenient to connect to a calendar or e-mail application, it also makes your account more vulnerable.
At the very least, be sure to regularly check which third-party applications access your cloud storage and remove any applications that you are not actively using (you can add them again later if necessary). For example, if you are in the Dropbox web interface, click on the avatar, then set up and connect to see the connected application.
5. Open account Alert
Most cloud storage services will be able to send important account event alerts, such as prompts for new logins, to ensure that they are turned on. You can also subscribe to alerts about activity within your account, such as new shares that have been created or deleted files and folders.
For example, in the case of Google Drive online, click my drive, then the message button, and then activity to see the recent changes in the account.
6. Deactivate old devices that still have access
Most cloud storage services allow users to synchronize files from multiple devices, so if you upgrade your phone or change your job and use a new laptop, you must correctly disconnect the old devices and deactivate them-in case the inheritors of these old devices access the data in some way.
This usually means exiting before completely uninstalling the application, but you should also exit from the browser you have used, or you can operate remotely in most accounts: in the case of OneDrive, enter an online Microsoft account and click on all devices to view and delete devices associated with your account.
7. Enable account recovery option
The security of your cloud storage account depends on the weakest link to which it is connected, which means that you need to keep the account recovery option as well protected as your login credentials. For example, do you want to set the password reset email to an email address that you can fully access?
Recovery options are usually in your account or security settings, so make sure they are relatively new. If you have security questions related to account access, the answers to these questions should not be easy for people who live with or work with you (or follow your social media account) to know.
8. Log out when you are not using your account
For convenience, you may want to maintain your login status when using a cloud storage account. When you are done, it is important that you log out to prevent others from accessing your files-especially if your computer is shared with others (such as others in your family).
The exit option should be quite obvious (cloud storage providers don't want you to be hacked either): in iCloud, click your name in the upper right corner of the browser tab and choose exit.
9. Protect your equipment, too.
Physical security is also important. Protect mobile phones, laptops, and other devices that use cloud storage accounts from unauthorized access. Otherwise, if someone has direct access to your phone or laptop, they may access one of your accounts directly.
Some cloud storage applications can add additional protection within the application, such as additional PIN or face unlock. For example, Dropbox for both Android and iOS provides this feature. In Dropbox, find the settings menu in the application, and then select configure passcode (Android) or change passcode (iOS).
At this point, I believe you have a deeper understanding of "what are the techniques for keeping personal cloud data storage secure in the server?" you might as well do it in practice. Here is the website, more related content can enter the relevant channels to inquire, follow us, continue to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.