1 A DIGITAL LIFE E-GUIDE Files in Flight: What You Should Know About Cloud Storage
2 What Is the Cloud?
3 Back then, all your files were stored on hardware. Party photos, spreadsheets, and school projects were all stored in hard drives or CDs. Today, you store your photos on Facebook, Instagram, or Picasa. Files are uploaded to Dropbox or Google Drive. You even use your as storage by sending yourself s with attachments! You know that your files are out there, but where? These files are in the cloud. The cloud is where you access services that help store, or run software applications anywhere in the world when needed. 1 Unlike downloadable desktop apps, cloud services can be used via web and mobile anytime, anywhere. 2 The cloud can scale down resources depending on what you need, which is cheaper than buying hardware. 3 This gives the illusion of infinite storage. Why Move to the Cloud? Imagine having infinite, secure storage for your backup data at a reasonable price. These are just some of the reasons why people are moving their data to the cloud. The cloud can also handle tasks that normally require hardware and downloadable software. Servers, for instance, are now hosted in the cloud. Companies like Google, host their applications inside the cloud. Google Drive, Vimeo, Flickr, Wordpress, and Widgetbox are just a few sample products users are fond of
4 The Cloud in Your Sky
5 The cloud can be used in different ways. FILE STORAGE AND SHARING Services like Dropbox, icloud, and Box give you free limited storage with an option to pay for more. These services allow identical files and folders to be synced in multiple devices. You can also share links to your files. MEDIA STORAGE AND PLAYBACK You don t have to always reprint photos, download MP3s, or hoard movies. Picasa, Spotify, Netflix, Soundcloud, and other services make media available on various devices through the web. SYSTEM BACKUP AND RESTORE Some operating systems provide cloud backup and restore services in case your device crashes or is stolen, or your data somehow gets deleted. BANKING AND FINANCE Personal finance services like Mint and PageOnce, make it easier for you to monitor expenses, pay bills, or view portfolios in different currencies. SOCIAL MEDIA AND COMMUNICATIONS You can also communicate and mingle through the cloud! Networking sites like Facebook and Twitter have apps you can use. Instant messaging (IM) and voice services like Google Voice and Skype also let you call and chat via the web instead of the usual phone services. NOTE-TAKING AND BOOKMARKING Copying links is old school with apps like Evernote and Instapaper that let you save and bookmark notes in a few clicks.
6 Why Soar in the Cloud?
7 HERE ARE SOME REASONS TO MOVE TO THE CLOUD: Data backed up in the cloud means less hardware for you. No need to update multiple copies anymore. It s easy to share your data in public, or even to a select few. There are dozens of free apps that you can upgrade for more features. Many apps are linked to each other. For instance, you can set up Tweets to appear on Facebook, too. Media downloads can come cheap when bought in-app or online. Your devices will use up less computing power as the cloud handles half the work. You save time and effort from manual work like creating expense graphs or paying bills. You pay less for billed services, like phone calls or professional fees. Like they say, there s an app for that!
8 Storms You Have to Brave
9 It s possible to lose your entire digital life in under an hour. This is a worst case scenario for many, but is only one of the many risks in taking to the cloud. THREAT CAMPAIGNS We predict that more threat campaigns will target cloud providers in different ways. Cybercriminals can easily hack accounts with weak or recycled passwords, or unencrypted data. FLAWS IN THE SYSTEM App flaws or bugs put data at risk as they open doors for cybercriminals to hack into. These flaws can start from the app interface themselves. ADDITIONAL COSTS You will be charged to use mobile data or apps. Malicious ones can even incur premium service charges to your next bill. ACCESS WOES Weak Internet connections, service downtime, and outages can slow down access to data or cloud-based software. PROVIDER DATA LEAKAGE Using cloud services gives control to your providers, which is a big problem when security is compromised. 5 Dropbox users were once spammed because of third-party sites linked to the service. 6 THE HUMAN FACTOR Malicious insiders or attackers will use social engineering scams against unknowing employees. DISTRIBUTED DENIAL OF SERVICE ATTACKS (DDoS) DDoS attacks toward cloudbased services make it difficult to access or control cloud apps. Even a person with minimal technical know-how can buy a kit to do this 5 6
10 Finding the Silver Lining
11 Always update your apps. App developers address service bugs and fix flaws through updates. Use cloud-based services that automatically encrypt data you upload like Trend Micro SafeSync. Don t click links or open attachments from suspicious-looking s. Same goes for IMs and private messages on social networking sites. Use mobile security programs like the Trend Micro Mobile Security to block malicious apps. Change simple passwords into phrases that are hard for others to remember. Don t recycle passwords or refer to popular media when creating new ones. Password managers like Trend Micro DirectPass allow you to use one master password for all your accounts. Back up you mobile data with services like Trend Micro Mobile Backup and Restore. This will come in handy when your device crashes or is stolen.
12 TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server and cloud-based security that fits our customers and partners needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. TRENDLABS SM TrendLabs is a multinational research, development, and support center with an extensive regional presence committed to 24 x 7 threat surveillance, attack prevention, and timely and seamless solutions delivery. With more than 1,000 threat experts and support engineers deployed round-the-clock in labs located around the globe, TrendLabs enables Trend Micro to continuously monitor the threat landscape across the globe; deliver real-time data to detect, to preempt, and to eliminate threats; research on and analyze technologies to combat new threats; respond in real time to targeted threats; and help customers worldwide minimize damage, reduce costs, and ensure business continuity by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.
SECURITY IN CONTEXT LATERAL MOVEMENT: How Do Threat Actors Move Deeper Into Your Network? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is
OVERVIEW Avaya IP Office The Intelligent Communications Solution for Small and Midsize Businesses Discover how to enhance customer service, control costs, and operate your business with optimum efficiency
Businesses don t buy phone systems for fun. If you re in the market, you re probably responding to an event, such as a move or serious problems with an existing system. Perhaps, you are looking to gain
ROGERS WHITE PAPER 1 Rev. May 2011 page 2 2 TABLE OF CONTENTS Introduction 3 Small Business Telephony Options 4 Basic Phone Service 4 Traditional PBX and Key Systems 4 Digital Services Business Cable and
white paper Public or Private Cloud: The Choice is Yours Current Cloudy Situation Facing Businesses There is no debate that most businesses are adopting cloud services at a rapid pace. In fact, a recent
A Trend Micro Research Paper Suggestions to Help Companies with the Fight Against Targeted Attacks Jim Gogolinski Forward-Looking Threat Research Team Contents Introduction...3 Targeted Attacks...4 Defining
VoIP 101: An introduction to the basics of Voice over Internet Protocol How to guide Introduction You may have heard of VoIP that it s the future of telephone service, and that you can save a lot of money
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
Hosted Communications 10 Ways Hosted PBX Can Benefit Your Business xo.com Hosted communications are voice and data communications hosted in the service provider s IP network. The provider owns and maintains
1 A Complete Guide To: VOIP Phone Solutions, Broadband & Must Know Business Technology About This Guide. This guide aims to give you the key facts about our hosted VOIP solution as well as impartial, factual
Is Connectivity A Human Right? For almost ten years, Facebook has been on a mission to make the world more open and connected. For us, that means the entire world not just the richest, most developed countries.
Hacker Intelligence Initiative Man in the Cloud (MITC) Attacks 1. Executive Summary In this report, we demonstrate a new type of attack we call Man in the Cloud (MITC). These MITC attacks rely on common
Voice Over Internet Protocol (VOIP) Helping with your telecoms management Voice over Internet Protocol (VoIP) What is VoIP? VoIP is the ability to transmit voice over the Internet VoIP was adopted by the
IP Telephony Contact Centers Mobility Services Avaya Advanced Communications System OVERVIEW More than 1 million businesses have turned to the Avaya Advanced Communications System. Why? Because the system
2014 DATA BREACH INVESTIGATIONS REPORT Executive Summary INSIDER MISUSE DOS ATTACKS MISCELLANEOUS ERRORS PHYSICAL THEFT AND LOSS CYBER-ESPIONAGE CRIMEWARE PAYMENT CARD SKIMMERS WEB APP ATTACKS 92 % THE
CLOUD COMPUTING: IS YOUR COMPANY WEIGHING BOTH BENEFITS & RISKS? Toby Merrill CLOUD COMPUTING: IS YOUR COMPANY WEIGHING BOTH BENEFITS & RISKS? Toby Merrill Toby Merrill, Thomas Kang April 2014 Cloud computing
1 A NEW NAS Experience a white paper Backup in a Data Driven World: Affordable Backup Options for Home and SMB September 2009 Table of Contents 2 Introduction 3 What is NAS? 3 Backup Methods and Features
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
The Definitive IP PBX Guide Understand what an IP PBX or Hosted VoIP solution can do for your organization and discover the issues that warrant consideration during your decision making process. This comprehensive
Expand your business community in the cloud You ve discovered the power of the cloud great potential for increasing efficiency, collaborating and saving money in the operation of your design-focused business.
www.pwc.com PwC Advisory Oracle practice 2012 How to drive innovation and business growth Leveraging emerging technology for sustainable growth 1 Heart of the matter Top growth driver today is innovation
How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying