Cloud Computing and File Sharing

cloud computing
(graphic borrowed from http://www.intelligentitnyc.com)

 

This week, we are focusing on Cloud Computing and File Sharing. Though there are different types of clouds, practically everyone who uses a computer uses “The Cloud” in some way or another. But do you really know how the cloud works?  Sending information via email and over the internet may be useful when you need to share or access something quickly.  However, if you do not share or access that information in a secure manner, what seemed quick and convenient could cause you or the subject of the information a huge headache if that information is intercepted to gets into the wrong hands.  Here are some things to consider when sending personal or sensitive information electronically both at UConn and in your personal life:

Cloud security tips

 It’s the little things that count. Take the proper precautions by adopting easy proactive security habits and it will go a long way in safeguarding your personal data on the cloud.

UConn resources for file sharing

We live in a fast paced world that has faced paced problems. With the click of a mouse, enormous amounts of data can be compromised in an instant.  Often times, email is not a secure method by which to transfer data or information.  Luckily, UConn does have some easy to use resources for you that are also secure.  The UITS Information Security Office recommends that you use a tool called “File Locker” to use when transmitting sensitive information.   File Locker is a web-based application that allows UConn faculty, staff, and students to securely send or temporarily store sensitive files.   Visit https://web2.uconn.edu/filelocker/ to learn more.

UConn resources for detecting insecure data at work and at home

We’re human, we make mistakes and it’s a part of life, right? We also have the ability to catch our mistakes. UITS has implemented a tool called “Identity Finder “that you can run on your work and personal computer to detect unsecure sensitive information such as banking numbers, credit card numbers, and social security numbers, thus catching our storage errors. The software scans your computer for these risks and gives you the option to securely “shred” or quarantine unsafe data on your computer. Identity Finder will even scan your outlook mail for content that shouldn’t be there.

UConn resources for cloud data storage

One cloud-based data storage option UConn offers is a tool called IBM File Net.  IBM File Net is an Enterprise Content/Document Management System and is available as a tool for data storage and management. More about IBM File Net and its various benefits can be found at this DailyDigest entry.