SlideShare uma empresa Scribd logo
1 de 14
“Cloud Security”
By-
Sofiya khan
B.sc.(hons.)cs
Table Of
Contents
1.
What is
cloud
computing?
3.
Why is it imp.?
2.
What is cloud
security?
4.
What are the
security risks in
cloud?
5.
How to secure?
6.
Basic cyber
security tips
1.What is
Cloud
Computing?
● Cloud computing is the delivery of different services
through the Internet. These resources include tools
and applications like data storage, servers,
databases, networking, and software.
● Rather than keeping files on a proprietary hard drive
or local storage device, cloud-based storage makes it
possible to save them to a remote database. As long
as an electronic device has access to the web, it has
access to the data and the software programs to run
it.
What is Cloud security?
Cloud security is a collection of procedures and technology designed to
address external and internal threats to business security.
Cloud security is a discipline of cyber security dedicated to securing
cloud computing systems. This includes keeping data private and safe
across online-based infrastructure, applications, and platforms.
Why is it important?
● As companies continue to migrate to the cloud, understanding the
security requirements for keeping data safe has become critical.
● Every component — from core infrastructure to small data like emails
and documents — can now be located and accessed remotely on
24/7 web-based connections. Threat actors can now target large
multi-organizational data centers and cause immense data breaches.
What are the security risks in cloud
?
1- DATA LOSS
➔It is also known as Data leakage because it is a process in which
data is being deleted, corrupted, and unreadable by a user, software,
or application.
➔It is the most common cloud security risk.
2-HACKED INTERFACES AND API
➔As cloud computing is completely dependent on Internet, so, these
APIs and interfaces are available in the public domain that can be
accessed by third party easily and harmed and hacked by the
hackers in a matter of time.
➔So, protecting Interfaces and APIs is also very important.
What are the security risks in cloud
?
3- DATA BREACH
➔It is the process in which the confidential data is viewed, accessed,
or stolen by the third party without any authorization, so
organization’s data is hacked by the hackers.
4-VENDOR LOCK-IN
➔It is one of the biggest security risks in cloud computing.
➔Organizations may face difficulty while transferring their services
from one vendor to another, as different vendors provide different
platforms that can caught difficulty while moving one cloud to another
without experiencing issues such as high costs,lrgal constraints, or
technical incompatibilities.
What are the security risks in cloud
?
5- SPECTRE AND MELTDOWN
➔It allows program to view and steal data which is currently processed
on computer that can run on personal computers, mobile, and in the
cloud. It can store the password, your personal information such as
images, emails, documents in the memory of other running
programs.
6-DENIAL OF SERVICES(DOS) ATTACKS
➔It occurs when the system receives too much traffic to buffer the
server.
➔Mostly, Dos attackers target web servers of large organization such
as banking, media companies, etc.
➔To recover the data, DoS attackers charge a great deal of time and
money to handle the data.
What are the security risks in cloud
?
7- ACCOUNT HIJACKING
➔It is a serious security risk in cloud computing.
➔It is the process in which individual user’s account or organization’s
cloud account( bank account, email account, social media account) is
stolen by hackers.
➔The hackers use the stolen account to perform unauthorized
activities.
How to secure?
1-Encryption
Encryption is one of the best ways to secure your cloud computing
systems. There are several different ways of using encryption::
1. Communications encryption with the cloud in their entirety.
2. Particularly sensitive data encryption, such as account credentials.
3. End-to-end encryption of all data that is uploaded to the cloud.
2-Identity and access management(IAM)
IAM tools and services allow enterprises to deploy policy-driven
enforcement protocols for all users attempting to access both on-premises
and cloud-based services. The core functionality of IAM is to create digital
identities for all users so they can be actively monitored and restricted
when necessary during all data interactions.
How to secure?
3-Data loss prevention(DLP)
Data loss prevention (DLP) services offer a set of tools and services
designed to ensure the security of regulated cloud data. DLP solutions
use a combination of remediation alerts, data encryption, and other
preventative measures to protect all stored data, whether at rest or in
motion.
4-Security information and event management(SIEM)
It provides a comprehensive security orchestration solution that
automates threat monitoring, detection, and response in cloud-based
environments.
Basic cyber security solution tips
1-Never leave the default settings unchanged.
2-Use strong passwords.
3-Use a password manager.
4-Protect all the devices.
5-Back up your data regularly.
6-Modify permissions.
7-Protect yourself with anti-virus and anti-malware.
8-Avoid accessing your data on public Wi-Fi.
9-Actively manage your accounts and services.
10-Have a look at all these points regularly.
THANK YOU!

Mais conteúdo relacionado

Semelhante a Cloud_security.pptx

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptxNickjohn33
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computingijtsrd
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxchWaqasZahid
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 

Semelhante a Cloud_security.pptx (20)

Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
cloud security.pptx
cloud security.pptxcloud security.pptx
cloud security.pptx
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
legal and ethical.ppt
legal and ethical.pptlegal and ethical.ppt
legal and ethical.ppt
 
Data Storage Issues in Cloud Computing
Data Storage Issues in Cloud ComputingData Storage Issues in Cloud Computing
Data Storage Issues in Cloud Computing
 
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
 
cyber security
cyber security cyber security
cyber security
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
What are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdfWhat are the Different Types of Endpoint Security Solutions-converted.pdf
What are the Different Types of Endpoint Security Solutions-converted.pdf
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 

Último

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Cloud_security.pptx

  • 2. Table Of Contents 1. What is cloud computing? 3. Why is it imp.? 2. What is cloud security? 4. What are the security risks in cloud? 5. How to secure? 6. Basic cyber security tips
  • 3. 1.What is Cloud Computing? ● Cloud computing is the delivery of different services through the Internet. These resources include tools and applications like data storage, servers, databases, networking, and software. ● Rather than keeping files on a proprietary hard drive or local storage device, cloud-based storage makes it possible to save them to a remote database. As long as an electronic device has access to the web, it has access to the data and the software programs to run it.
  • 4. What is Cloud security? Cloud security is a collection of procedures and technology designed to address external and internal threats to business security. Cloud security is a discipline of cyber security dedicated to securing cloud computing systems. This includes keeping data private and safe across online-based infrastructure, applications, and platforms.
  • 5. Why is it important? ● As companies continue to migrate to the cloud, understanding the security requirements for keeping data safe has become critical. ● Every component — from core infrastructure to small data like emails and documents — can now be located and accessed remotely on 24/7 web-based connections. Threat actors can now target large multi-organizational data centers and cause immense data breaches.
  • 6. What are the security risks in cloud ? 1- DATA LOSS ➔It is also known as Data leakage because it is a process in which data is being deleted, corrupted, and unreadable by a user, software, or application. ➔It is the most common cloud security risk. 2-HACKED INTERFACES AND API ➔As cloud computing is completely dependent on Internet, so, these APIs and interfaces are available in the public domain that can be accessed by third party easily and harmed and hacked by the hackers in a matter of time. ➔So, protecting Interfaces and APIs is also very important.
  • 7. What are the security risks in cloud ? 3- DATA BREACH ➔It is the process in which the confidential data is viewed, accessed, or stolen by the third party without any authorization, so organization’s data is hacked by the hackers. 4-VENDOR LOCK-IN ➔It is one of the biggest security risks in cloud computing. ➔Organizations may face difficulty while transferring their services from one vendor to another, as different vendors provide different platforms that can caught difficulty while moving one cloud to another without experiencing issues such as high costs,lrgal constraints, or technical incompatibilities.
  • 8. What are the security risks in cloud ? 5- SPECTRE AND MELTDOWN ➔It allows program to view and steal data which is currently processed on computer that can run on personal computers, mobile, and in the cloud. It can store the password, your personal information such as images, emails, documents in the memory of other running programs. 6-DENIAL OF SERVICES(DOS) ATTACKS ➔It occurs when the system receives too much traffic to buffer the server. ➔Mostly, Dos attackers target web servers of large organization such as banking, media companies, etc. ➔To recover the data, DoS attackers charge a great deal of time and money to handle the data.
  • 9. What are the security risks in cloud ? 7- ACCOUNT HIJACKING ➔It is a serious security risk in cloud computing. ➔It is the process in which individual user’s account or organization’s cloud account( bank account, email account, social media account) is stolen by hackers. ➔The hackers use the stolen account to perform unauthorized activities.
  • 10.
  • 11. How to secure? 1-Encryption Encryption is one of the best ways to secure your cloud computing systems. There are several different ways of using encryption:: 1. Communications encryption with the cloud in their entirety. 2. Particularly sensitive data encryption, such as account credentials. 3. End-to-end encryption of all data that is uploaded to the cloud. 2-Identity and access management(IAM) IAM tools and services allow enterprises to deploy policy-driven enforcement protocols for all users attempting to access both on-premises and cloud-based services. The core functionality of IAM is to create digital identities for all users so they can be actively monitored and restricted when necessary during all data interactions.
  • 12. How to secure? 3-Data loss prevention(DLP) Data loss prevention (DLP) services offer a set of tools and services designed to ensure the security of regulated cloud data. DLP solutions use a combination of remediation alerts, data encryption, and other preventative measures to protect all stored data, whether at rest or in motion. 4-Security information and event management(SIEM) It provides a comprehensive security orchestration solution that automates threat monitoring, detection, and response in cloud-based environments.
  • 13. Basic cyber security solution tips 1-Never leave the default settings unchanged. 2-Use strong passwords. 3-Use a password manager. 4-Protect all the devices. 5-Back up your data regularly. 6-Modify permissions. 7-Protect yourself with anti-virus and anti-malware. 8-Avoid accessing your data on public Wi-Fi. 9-Actively manage your accounts and services. 10-Have a look at all these points regularly.