A hack could endanger your company’s life… especially in Indonesia where there is huge group of self-taught, smart and restless youth, trying to cash in to survive the lack of opportunity in the region.
Example where sensitive customer information got bump from AshleyMadison.com, a cheating website married couples, they have appeared to have made good on their threat to post the data online.
10 Gb of data dump was posted to the dark web using an Onion address accessible only through the Tor browser. AshleyMadison.com business model includes charging a small fee to completely remove your personal data from their system. Unfortunately, it appears that even the people that paid to be removed still found their personal information in the leak and faces destroyed.
Produk Cloud believes it’s not the first company to have user data compromised and neither will it be the last leak. High-profile breach comes the opportunity to learn from the mistakes and consider best practices going forward…
1. Only collect data that you need
The smaller the data the easier it is to secure. Understand the important data to store and have a plan to get rid of data that’s no longer needed. If you must store sensitive data then consider hashing or encrypting it.?
Hashing is a programming function that converts a string of text into a smaller, undecipherable variation of the input, designed so it’s impossible to turn the output back to its original text.
2. Understand the user agreement of your cloud service storage
Read the user agreement of the service you are planning to sign up for. It is texty but no doubt you really need to face those text volumes as its contain essential information you are looking for.
Encryption is, so far, the best way you can protect your data. Encryption allows for encoding of text so that it can only be accessed with a special key or password.
4. Use a Strong Password / Apply Two-Step Verification
As the first line of defence against malicious hackers out there, you had better be sure that your password can stand a hacking or cracking attempt. There are tons of tips on the Internet on what makes for a good password.
5. Back Up Data Locally
Always have a backup for your data. Generally speaking, it is good practice to create electronic copies for any of your data so that you will still be able to access them even when the original is lost or has been corrupted.
6. Test.. Test .. Test
Keep penetrating, don’t stop and offer a bounty for help.
– Jamie , Produk Cloud Indonesia