- Top 10 Computer Security Tips
- Securing Confidential Electronic Data
- Network Access Controls
- How to retrieve a lost mobile/smartphone?
- Security Documents
- Security for Mobile/Smartphones
- Cloud Computing Security Best Practices
Cloud computing brings many opportunities to work remotely from computers as well as mobile devices such as smartphones and tablets, but while these may not be conventional “computers”, many of the IT best practices are still relevant and will still apply.
Cloud computing, in contrast to the conventional computing where a laptop or desktop accesses internal servers through a managed and well-defined network infrastructure, is instead available exclusively online through a compatible browser, be it on a desktop, laptop, tablet, or smartphone with an Internet connection anywhere in the world. Shifting computing to the cloud reduces the relative effectiveness of conventional security mechanisms such as firewalls, network anti-virus and anti-spam systems, but places more emphasis on browser updates, password security, and fine-tuned access restrictions, that is, more emphasis on the user’s security practices.
So although the computing model has shifted, security best practices and concepts still apply in a cloud environment, but in a different context and focus than conventional computing.