• Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
    • Transportation and Logistics Managed IT Services, Support & Solutions
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

(410) 280-3000

Find Us
Support Portal
ICSIICSI
  • Managed IT Services
    • Fully Managed IT Services & Managed IT Support
    • Co-Managed IT Support
    • Virtual IT Help Desk Support
  • Managed Security
  • Industries
    • Healthcare Managed IT Support – Healthcare Managed IT Services
    • Construction and Manufacturing Managed IT Services
    • Government Contractor Managed IT Services
    • Non-Profit Managed IT Support
    • Small and Medium Size Business Managed IT Services – Managed IT Services for Small Businesses
    • Financial Services Managed IT Support
    • Transportation and Logistics Managed IT Services, Support & Solutions
  • Services & Consulting
    • Office 365 Support
    • Network Security
    • Risk Assessments
    • Office Moves and Network Configuration
    • Disaster Recovery and Business Continuity Planning
    • Internet and Cloud Phone Services (VoIP)
    • Cloud Services Evaluation & Integration
    • Website Services
  • Blogs
    • Weekly IT Security Tip
    • Tech Tips for Business Owners
    • Cyber Security Reports
      • IT Buyers Guide
      • 21 Critical Questions Your IT Consultant Should Be Able to Say ‘Yes’ To
      • Protecting & Preserving Your IT Network Security
      • Top 10 Ways Hackers Get Around Your Firewall & Anti-Virus
      • The Dangers of Cybercrime to Your Company & You
  • About Us
    • Business Principles
    • Leadership Team
    • Testimonials
  • Contact
    • Career Opportunities
  • Support Portal
  • Call Us: (410) 280-3000

3 rules to keeping your data safe in the cloud

December 16, 2024 Weekly IT Security Tip

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the user, are being smart about security. Here are a few things you can easily do to improve security in the cloud:

  1. Maintain a STRONG password of at least eight characters with both uppercase and lowercase letters, numbers and symbols. Do NOT make it easy, such as “Password123!” While that technically meets the requirements, a hacker could easily crack that.

  2. Make sure the device you’re using to access the application is secure. This is an area where you need professional help in installing and maintaining a strong firewall, antivirus and spam-filtering software. Don’t access your cloud application with a device you also use to check social media sites and free e-mail accounts like Gmail. 

  3. “Reverse”-backup your data. If the data in a cloud application is important, make sure you’re downloading it from the application and backing it up in another safe and secure location. That way, if your account is hacked or the data is corrupted, you have a copy.

______________________________________________________________________________

Click here to request a Free IT Assessment and we will work with you to put together an action plan for you to implement Managed Network Services.

Share
0

You also might be interested in

Boost Your Business Productivity with Tailored IT Services in Maryland

May 5, 2023

Managing your IT can be time-consuming, leaving you with less[...]

Why Small Businesses Should Invest in Managed IT Services: The Key to Efficiency and Growth
Concept - security and data integrity, data protection, security deposits, payments, guarantee the integrity of the information. Illustration thin line design of vector doodles, infographics elements.

Why Small Businesses Should Invest in Managed IT Services: The Key to Efficiency and Growth

Feb 26, 2025

It’s understandable that some small business owners might think of[...]

How can Managed IT Services Enhance Construction Projects?

Apr 25, 2025

  In the construction industry, technology plays a crucial role[...]

Contact Us

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

    Schedule your FREE IT Assessment today! Contact Us
    Managed IT Services Baltimore MD

    We Manage your IT.
    You manage your business.

    Home of Annapolis GEEKS

    AnnapolisGEEKS.com

    Contact Us

    • ICSI (Headquarters)
      1612 McGuckian St
      Suite 200
      Annapolis, MD 21401
    • 410-280-3000
    • ICSI (Florida Office)
      4830 West Kennedy Blvd
      Suite 600
      Tampa, FL 33609
    • 813-217-9171
    • Email Us

    Our Partners

    • Ubiquiti Networks
    • Sonicwall
    • veeam
    • Microsoft
    • Dell
    • vmware
    • DUO

    Follow us on Facebook for Tips & News

    © 2025 • ICSI • All Rights Reserved

    • Managed IT Services
    • Industries
    • IT Services & Consulting
    • Cyber Security Reports
    • About Us
    • Contact
    • Privacy Policy
    • Sitemap