Lawyers are often tasked with seeking the truth. When we’re talking about technology, the truth is that any application, architecture, or product can fail us. Whether there’s a design flaw or a security gap, digital technologies can experience a different kind of disruption that has nothing to do with innovation. The users themselves sometimes cause these issues, through product misuse, poor execution, or general user error.
Take cloud computing. Cloud computing has allowed us access to information and tools that we never imagined even 15 years ago. But like all technologies, there are dos and don’ts associated with cloud that can make your data safer yet still more accessible. But there are also definite correct and incorrect security and operational tactics for using cloud computing. This article shows the small law firm how to avoid common mistakes that cause cloud disruption.
Phishing, which are spam emails with malicious software attached, are rampant. Symantec says one in every 131 emails contain a virus. These viruses are distributed through the cloud and all it takes is one wrong click and, Houston, we could have a serious problem. Here are eight more points of vulnerability associated with cloud computing that your law firm should take note of:
Don’t share your login in credentials with anyone else in your office. Login credentials help track user activity. If you take this security protocol away, how will you know which person really deleted that important file or was accessing important client data?
Change your password frequently and use strong passwords. Don’t use “1,2,3,4” or a nickname that everyone knows. Don’t use the word “password” in your password. Make use of upper and lower case, symbols, and numbers. When it comes to passwords – the whole keyboard is your friend.
Don’t use public computers to access your cloud solutions provider network. Avoid computers in hotel business centers, airport lounges, and libraries. Never access your network to download data in any public place. Don’t log in and check your bank account or make an online payment by credit card from a public location.
If your cloud solutions provider or any of your vendors offer security questions, use them but choose them carefully. Skip the Mom’s maiden name question – we can find that out pretty easily.
Be careful on social media. Just always remember that posting on LinkedIn or Facebook is pretty open for anyone to find.
Also be cautious about user permissions. Your cloud solutions or managed service provider might be able to help you select which employees, figuratively speaking, will get a key to the front door, the code to the safe, or no access to anything at all.
Never ever ignore your cloud solutions provider’s attempts to have you update your computers. Never delay updating security patches on hardware such as your phone, desktop or laptop. One benefit of the cloud is that your cloud solutions provider is constantly making changes and upgrades to their services that you don’t even notice. As new viruses and hacker threats emerge, your cloud provider will issue patches that keep your office safe.
Keep your work computer separate from your personal computer. If you’re using the same computer that your son uses and he likes to download free games, it might not be wise to access your office server. Free apps and games can contain malware. If you access your office data on the same home computer that might have malware installed, it’s like leaving the front door unlocked and the alarm off when you leave the office. You may inadvertently introduce a virus into your corporate data.
Having an IT expert like TOSS C3 in your corner may mean the difference between these epic technology fails, and the optimization of cloud solutions to build your business. Our team is standing by to help you make the most of your cloud solutions investment. Contact us – we can help.