Carnegie Mellon University

cloud security

August 19, 2021

Securely Using the Cloud

Cloud computing is a general term that refers to the delivery of different services such as data storage, servers, databases, networking, and software over the Internet or virtual space instead of on a computer’s hard drive. Cloud-based storage allows for information to be accessed remotely from any Internet connected device, anywhere in the world making it extremely convenient for many organizations. 

Carnegie Mellon University offers secure, encrypted cloud-based solutions such as Box and Google Drive to its community members for easy collaboration and data storage. Individuals who utilize these cloud-based solutions should review the tips below ensure their data remains secure.

If using a personal cloud-based storage solution it is recommended that individuals use a trusted cloud-based solution that offers encrypted storage. In addition to the tips above, any community members who use a personal cloud-based storage solution at home should take the following proactive security measures on their accounts. Remember that personal cloud storage accounts are not acceptable for Carnegie Mellon University work.

  • Use Strong Authentication: Make the cloud account password long and complex. One way to do this is to use a passphrase instead of a password. The password should not be used for any other account. Furthermore, ensure that the cloud solution offers two-factor authentication (2fa) and enable it on the account for an added layer of security. 2fa will help to prevent a hacker from accessing your data even if the password becomes compromised.
  • Enable Account Alerts: Most cloud services will have a notification feature which alerts users to new logins, as well as when new files or folders are shared and deleted. Be sure to enable those alerts to maintain awareness of what is occurring within your cloud account.
  • Use Backup and Recovery Options: It is convenient to dump all types of data into one cloud solution however this creates a single point of failure. Instead, be familiar with your service’s backup, retention and restore capabilities, and possibly safeguard duplicate copies of the data into another repository such as a 2nd cloud storage solution or hard drive.