Are you backing up your data incorrectly?

Since its hard to give up super-easy-to-use and accessible cloud storage apps, you should consider how to properly secure your data – before something goes wrong with it!

Cloud backup tools have made us lazy when it comes to data security. We set everything to Auto and forget about its existence. We confuse synchronization (instant updates) with backup (preserving history). While the cloud works seamlessly, it lacks the true ownership of a local server – even though setting up a server might seem outdated and complicated.

 

The price to cloud ease of use is privacy: Your data could be used to train AI models or for vague "experience enhancements" that never really get a full explanation. But since it's hard to give up super-easy-to-use and accessible cloud storage apps, you should consider how to properly secure your data – before something goes wrong with it!

 

The Illusion of Encryption

Your private files aren't really private.

 

A common misconception is that encryption means "privacy." After you upload data, such as photos and documents, it's encrypted, but the hosting server holds the key. It's a matter of trust. If the server is hacked, sued, or simply decides to allow an algorithm to use the data for 'training and optimization,' they gain access to everything. This is server-side encryption, and it's the default for a reason: It allows them to sell users features like AI search and organization, but it strips them of true ownership.

But you can prevent storage providers from accessing your data by applying non-disclosure encryption. This simply means you encrypt the data before it's uploaded to the cloud. You own the encryption keys, and the server knows nothing but meaningless characters. You can encrypt data directly on your device, or even use open-source tools like Cryptomator to create an encrypted vault within existing cloud storage.

This certainly leads to an inconvenience that many of us would like to avoid, but that's the price you pay for privacy. It turns your cloud storage into a regular hard drive, which it should have done in the first place.

 

Strong passwords = strong security

Even strong passwords need authentication.

 

We often think that setting a strong 16 or 18-digit password is enough to protect our data. And to some extent, that's true – passwords should always be long and strong, but shouldn't be repeated across multiple websites. Hackers use passwords stolen from one website to gain access to another. This is the most common way cloud accounts are compromised.

To truly secure your account, you should always enable at least two-factor authentication or SMS-based two-step verification. However, to secure accounts with sensitive data, you should invest in hardware authentication using a security key like YubiKey or Google Titan. Using this method, you must tap the security key to access your account.

Carrying a physical key for a digital account might seem counterintuitive, but it renders lost passwords useless. A hacker on another continent can't replicate the physical hardware on your desk. It requires a level of proactiveness that software-based security can't match.

Ransomware vulnerability

Don't ignore the threats!

 

Ransomware has evolved to exploit our trust in cloud synchronization and backups. Some ransomware variants can also encrypt linked cloud backup drives on your computer, rendering any backups stored in the cloud useless. In that case, sometimes, cloud storage is just as vulnerable as your local storage.

The best defense against this is immutability and strict version control. You need a WORM (Write Once, Read Many) backup history. This ensures that once a backup is created, it cannot be modified or deleted within a certain period, even by the owner (you). To use WORM, you may need to adjust advanced settings or specific software; that's the only guarantee against deletion. It reinforces the "3-2-1 Rule" for data backups: Keep a copy of the data offline or immutable, so that no automation function can destroy it.

Big tech companies are safe enough.

Cloud applications will keep our backups safe.

Certainly, multi-billion dollar data centers like these must have data security measures in place. And that argument is true to some extent. But these security measures are typically implemented to protect the platform, not individual data, from their own mistakes.

If your account is compromised due to a weak password or your data is retrieved because it wasn't encrypted on the client side, it's your fault, not theirs.

Relying entirely on the provider's default settings is like assuming the landlord is responsible if you leave your apartment door unlocked. You must proactively take measures to protect your own "door."

That's why the Shared Responsibility Model is the best approach. The cloud service provider is responsible for the security OF the cloud (hardware, network, global infrastructure). You are responsible for security WITHIN the cloud (who has access, how data is encrypted, and data integrity).

Related posts
  • 4 tips or data protection on iPad

    the following tips will help you set the security code for each application in the ipad, set up a more complex password, remotely lock the data as well as back up data in case you are reluctant to delete data in the ipad.
  • How to backup and restore web data with FavBackup

    if you accidentally reinstall the browser and lose all your data, but why not back up your bookmarks, passwords, or any web browser data? the solution is to install ...
  • Comprehensive management of iCloud from computer

    icloud is apple's cloud storage service, integrating the ability to backup data online and synchronize data between apple devices. therefore, icloud is built into iphone, ipad and macs, but you can also use icloud on windows. in the article below, tipsmake.com will guide you how to use this service of apple.
  • Instructions to turn SkyDrive into Network Drive in Windows 7

    a lot of people use windows 8 because the operating system is integrated with skydrive, but actually with windows 7, there is still a way for us to experience this cloud storage access.
  • Methods for data backup on iPad

    one of the basic tasks of any it professional is to ensure data is available wherever and whenever users need it. disaster recovery is the process of ensuring that this condition is met in all situations. when using an ipad in a business, it is important to restore the data when something goes wrong for a manager
  • Backing up data from Gmail, Google Docs is easy with BackupGoo

    when using google software such as gmail, google calendar or google docs, if you want to search for a software to help backup your data on these services ...
Other Security solution articles
Category

System

Windows XP

Windows Server 2012

Windows 8

Windows 7

Windows 10

Wifi tips

Virus Removal - Spyware

Speed ​​up the computer

Server

Security solution

Mail Server

LAN - WAN

Ghost - Install Win

Fix computer error

Configure Router Switch

Computer wallpaper

Computer security

Mac OS X

Mac OS System software

Mac OS Security

Mac OS Office application

Mac OS Email Management

Mac OS Data - File

Mac hardware

Hardware

USB - Flash Drive

Speaker headset

Printer

PC hardware

Network equipment

Laptop hardware

Computer components

Advice Computer

Game

PC game

Online game

Mobile Game

Pokemon GO

information

Technology story

Technology comments

Quiz technology

New technology

British talent technology

Attack the network

Artificial intelligence

Technology

Smart watches

Raspberry Pi

Linux

Camera

Basic knowledge

Banking services

SEO tips

Science

Strange story

Space Science

Scientific invention

Science Story

Science photo

Science and technology

Medicine

Health Care

Fun science

Environment

Discover science

Discover nature

Archeology

Life

Travel Experience

Tips

Raise up child

Make up

Life skills

Home Care

Entertainment

DIY Handmade

Cuisine

Christmas

Application

Web Email

Website - Blog

Web browser

Support Download - Upload

Software conversion

Social Network

Simulator software

Online payment

Office information

Music Software

Map and Positioning

Installation - Uninstall

Graphic design

Free - Discount

Email reader

Edit video

Edit photo

Compress and Decompress

Chat, Text, Call

Archive - Share

Electric

Water heater

Washing machine

Television

Machine tool

Fridge

Fans

Air conditioning

Program

Unix and Linux

SQL Server

SQL

Python

Programming C

PHP

NodeJS

MongoDB

jQuery

JavaScript

HTTP

HTML

Git

Database

Data structure and algorithm

CSS and CSS3

C ++

C #

AngularJS

Mobile

Wallpapers and Ringtones

Tricks application

Take and process photos

Storage - Sync

Security and Virus Removal

Personalized

Online Social Network

Map

Manage and edit Video

Data

Chat - Call - Text

Browser and Add-on

Basic setup