TrendLabs Digital Life E-guide: What You . - Trend Micro

3y ago
26 Views
2 Downloads
1.32 MB
12 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Laura Ramon
Transcription

ADIGITAL LIFE E-GUIDEFiles in Flight:What You ShouldKnow AboutCloud Storage

What Is the Cloud?

Back then, all your files were stored on hardware. Partyphotos, spreadsheets, and school projects were all stored inhard drives or CDs. Today, you store your photos onFacebook, Instagram, or Picasa. Files are uploaded toDropbox or Google Drive. You even use your email as storageby sending yourself emails with attachments! You know thatyour files are out there, but where?These files are in the cloud. The cloud is where you accessservices that help store, or run software applications anywherein the world when needed.1 Unlike downloadable desktop apps,cloud services can be used via web and mobile anytime, anywhere.2The cloud can scale down resources depending on what you need,which is cheaper than buying hardware.3 This gives the illusion of infinitestorage.Why Move to the Cloud?Imagine having infinite, secure storage for your backup data at areasonable price. These are just some of the reasons why people aremoving their data to the cloud.The cloud can also handle tasks that normally require hardware anddownloadable software. Servers, for instance, are now hosted in the cloud.Companies like Google, host their applications inside the cloud. GoogleDrive, Vimeo, Flickr, Wordpress, and Widgetbox are just a few sampleproducts users are fond of.41234http://media.johnwiley.com.au/product a-view-inside-the-cloud

The Cloud inYour Sky

The cloud can be used in different ways.FILE STORAGE AND SHARING Services like Dropbox, iCloud, andBox give you free limited storagewith an option to pay for more.These services allow identicalfiles and folders to be synced inmultiple devices. You can alsoshare links to your files.MEDIA STORAGE AND PLAYBACK You don’t have to always reprintphotos, download MP3s, or hoardmovies. Picasa, Spotify, Netflix,Soundcloud, and other servicesmake media available on variousdevices through the web.SYSTEM BACKUP AND RESTORE Some operating systems providecloud backup and restoreservices in case your devicecrashes or is stolen, or your datasomehow gets deleted.BANKING AND FINANCE Personal finance services likeMint and PageOnce, make iteasier for you tomonitor expenses,pay bills, or viewportfolios in differentcurrencies.SOCIAL MEDIA ANDCOMMUNICATIONS You can also communicateand mingle through the cloud!Networking sites like Facebookand Twitter have apps you canuse. Instant messaging (IM) andvoice services like Google Voiceand Skype also let you call andchat via the web instead of theusual phone services.NOTE-TAKING ANDBOOKMARKING Copying links is old school withapps like Evernote and Instapaperthat let you save and bookmarknotes in a few clicks.

Why Soar inthe Cloud?

HERE ARE SOME REASONS TO MOVE TO THE CLOUD: Data backed up in the cloud means less hardware for you. No need to update multiple copies anymore. It’s easy to share your data in public, or even to a select few. There are dozens of free apps that you can upgrade for morefeatures. Many apps are linked to each other. For instance, you can set up Tweetsto appear on Facebook, too. Media downloads can come cheap when bought in-app or online. Your devices will use up less computing power as the cloud handles halfthe work. You save time and effort from manual work like creating expensegraphs or paying bills. You pay less for billed services, like phone calls or professional fees. Likethey say, there’s an app for that!

Storms You Haveto Brave

It’s possible to lose your entire digital life in under an hour.This is a worst case scenario for many, but is only one of themany risks in taking to the cloud.THREAT CAMPAIGNS We predict that more threatcampaigns will target cloudproviders in different ways.Cybercriminals can easily hackaccounts with weak or recycledpasswords, or unencrypted data.FLAWS IN THE SYSTEM App flaws or bugs put data atrisk as they open doors forcybercriminals to hack into.These flaws can start from theapp interface themselves.ADDITIONAL COSTS You will be charged to use mobiledata or apps. Malicious onescan even incur premium servicecharges to your next bill.ACCESS WOES Weak Internet connections,service downtime, and outagescan slow down access to data orcloud-based software.PROVIDER DATA LEAKAGE Using cloud services gives controlto your providers, which is a bigproblem whensecurity iscompromised.5Dropbox users wereonce spammedbecause of third-partysites linked to theservice.6THE HUMAN FACTOR Malicious insiders or attackerswill use social engineering scamsagainst unknowing employees.DISTRIBUTED DENIAL OFSERVICE ATTACKS (DDoS) DDoS attacks toward cloudbased services make it difficultto access or control cloud apps.Even a person with minimaltechnical know-how can buy a kitto do this5 0806-23orv.html6 http://gigaom.com/cloud/dropbox-yes-we-werehacked/

Finding theSilver Lining

Always update your apps. App developers address servicebugs and fix flaws through updates. Use cloud-based services that automatically encrypt datayou upload like Trend Micro SafeSync . Don’t click links or open attachments from suspicious-lookingemails. Same goes for IMs and private messages on socialnetworking sites. Use mobile security programs like the Trend Micro Mobile Security toblock malicious apps. Change simple passwords into phrases that are hard for others toremember. Don’t recycle passwords or refer to popular media whencreating new ones. Password managers like Trend Micro DirectPass allow you to use one master password for all your accounts. Back up you mobile data with services like Trend Micro Mobile Backupand Restore. This will come in handy when your device crashes or isstolen.

TREND MICRO TRENDLABSSMTrend Micro Incorporated (TYO: 4704; TSE: 4704), a globalcloud security leader, creates a world safe for exchangingdigital information with its Internet content securityand threat management solutions for businesses andconsumers. A pioneer in server security with over20 years’ experience, we deliver top-ranked client, serverand cloud-based security that fits our customers’ andpartners’ needs, stops new threats faster, and protects datain physical, virtualized and cloud environments. Poweredby the industry-leading Trend Micro Smart ProtectionNetwork cloud computing security infrastructure, ourproducts and services stop threats where they emerge—from the Internet. They are supported by 1,000 threatintelligence experts around the globe.TrendLabs is a multinational research, development,and support center with an extensive regionalpresence committed to 24 x 7 threat surveillance,attack prevention, and timely and seamless solutionsdelivery. With more than 1,000 threat experts andsupport engineers deployed round-the-clock in labslocated around the globe, TrendLabs enables TrendMicro to continuously monitor the threat landscapeacross the globe; deliver real-time data to detect, topreempt, and to eliminate threats; research on andanalyze technologies to combat new threats; respondin real time to targeted threats; and help customersworldwide minimize damage, reduce costs, and ensurebusiness continuity. 2012 by Trend Micro, Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro,Incorporated. All other product or company names may be trademarks or registered trademarks of their owners.

TREND MICRO Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years experience, we deliver top-ranked client, server

Related Documents:

TrendLabs 2016 Annual Security Roundup 4 TrendLabs 2016 Security Roundup: A Record Year for Enterprise Threats 0 250 150 2015 2016 29 247 752% increase Ransomware Spiked 752% in New Families in 2016 In a span of 12 months, the number of discovered ransomware families jumped from 29 to 247. This marks

TrendLabs sampled the malware arrival vectors to determine what the most common means of infection is today. More than 80 percent of the top malware responsible for the most infections in 2010 arrived via the Web, most commonly via unknowingly downloading malicious binaries, proving our 2010 prediction that one Web visit is enough to get infected.

Trend Micro reserves the right to modify the contents of this . Other organizations felt the effects of poor Internet of Things (IoT) security when the Mirai botnet surfaced and took down their servers. . TrendLabs 2016 Security Roundup: A Record Year for Enterprise Threats.

Trend Micro publishes its Annual Threat Roundup and Forecast based on information from TrendLabs, Trend Micro’s global network of research, service, and support centers committed to constant threat surveillance and attack prevention. With accurate, real-time data, TrendLabs delivers effective, timely security measures designed to

A TrendLabs Report TrendLabs Security Intelligence Blog Jay Yaneza and Erika Mendoza . discussed above seem to imply that their targets have bare internet access. Furthermore, . Trend Micro detects all of the indicators of both threats, and is constantly in the look-out for such .

5 TrendLabs. (2014). Trend Micro Security News. “TrendLabs 2Q 2014 Security Roundup: Turning the Tables on Cyber . with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver

environments. Powered by the industry-leading Trend Micro Smart Protection Network cloud computing security infrastructure, our products and services stop threats where they emerge—from the Inter-net. They are supported by 1,000 threat intelligence experts around the globe. TRENDLABS. SM. TrendLabs is a multinational research .

Digital inclusion is defined in various ways and is often used interchangeably with terms such as digital skills, digital participation, digital competence, digital capability, digital engagement and digital literacy (Gann, 2019a). In their guide to digital inclusion for health and social care, NHS Digital (2019) describe digital