Cloud Computing and Data Security
January 10, 2020


Photo credit: www.inc.com
- Cambridge Analytica made major news headlines when it accessed Facebook data to profile voters. They harvested data from Facebook profiles without consent and used the data for political means in an unauthorized way. Approximately 87 million users were compromised.
Photo credit: www.fortune.com
- Marriott Starwood Hotels’ guest database was comprised leaving 327 million guest records containing personal information including passport numbers exposed.

- Do not allow employees to have free access to everything. For example, the only employees that should have access to payroll information are those that are directly involved with payroll.
- Enough can’t be said for training yourself and your staff. Education is the key to aid in avoiding security breaches. New systems are challenging making specific employee training regarding the system an important part of limiting security breaches.
- Multi-factor authorization is a great way to lower the risk of security breaches and is considered to be one of the most economical and effective methods of keeping hackers away.
- A solid data backup and recovery mechanism will allow you to recover important data lowering the hacker’s ability to hold your precious data as a hostage for ransom.
Marketing That Grows Your Business
©2000 - CyberSpyder Marketing Services