Cloud IT Platform Best Practices

So, after working in the Cloud Technology platforms since 2005, here is my Cloud Best Practices Solution:

?1.?????Avoid using any cloud solution to reduce the breadth of the business cybersecurity attack footprint.

2.?????If a cloud solution is unavoidable, do the following things:

a.??????Keep proprietary databases and associated systems under complete IT control inside the business and off the cloud platform.?Do not give hackers the opportunity to steal business data.?Remember that hackers can’t steal what isn’t there.?

b.?????Offload to the cloud non-proprietary and IT-staff time-consuming systems and associated data.??

?????????????????????????????????????????????????????????????i.?????Emails – without invoices and without proprietary info.

???????????????????????????????????????????????????????????ii.?????Business website creation and updates.

?????????????????????????????????????????????????????????iii.?????IoT devices ?

?????????????????????????????????????????????????????????iv.?????General applications – Microsoft Office 365, etc…

c.???????

Dr. William Kessler

?

要查看或添加评论,请登录

Dr. William A. Kessler的更多文章

  • Copying Microsoft Word Files

    Copying Microsoft Word Files

    If you are copying a Microsoft Word file or image within it and get the message "This document contains fields that can…

  • Home Router Security

    Home Router Security

    Since many people now work from home here is a way to keep your home router fast, up to date and secure. Set security…

  • How To Get the Best Buy for a Laptop

    How To Get the Best Buy for a Laptop

  • The Cloud Security Threats Are Winning!

    The Cloud Security Threats Are Winning!

    Dr. William Kessler Date: 6/5/2020 The Cloud Security Threats are Winning! Abstract: Critical Issue #1: Pandemic –…

  • Building a Bottoms-Up Cloud Security Framework

    Building a Bottoms-Up Cloud Security Framework

    Article: Building a Bottoms-Up Cloud Security Framework Name: Dr. William A.

  • Zero Trust Security Architecture

    Zero Trust Security Architecture

    Introduction: As an introduction, many security breaches occur because cyber hackers identify and exploit security…

    2 条评论
  • Laptop Buying Tips

    Laptop Buying Tips

    Do not buy a laptop online. Why? Because if it comes to you dead-on-arrival (DOA) then you have to mail it back…

    1 条评论
  • Online Colleges Are Taking Over

    Online Colleges Are Taking Over

    I have been looking at the growth of online colleges and here is my prediction over the next 5 years. Half of all…

  • The Rise of Data Analytics in College Business Programs

    The Rise of Data Analytics in College Business Programs

    After listening to Bloomberg Business Radio this week, I found out the following info. The Columbia School of Business…

    2 条评论
  • Stock Exchanges

    Stock Exchanges

    Know and understand how international stock exchanges affect trade, financial transactions, public policy, laws, and…

社区洞察

其他会员也浏览了