{"id":3729,"date":"2017-04-30T07:36:31","date_gmt":"2017-04-30T07:36:31","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=3729"},"modified":"2017-12-19T07:05:15","modified_gmt":"2017-12-19T07:05:15","slug":"it-policies-for-more-secured-cloud-usage","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/it-policies-for-more-secured-cloud-usage\/","title":{"rendered":"IT policies for more secured cloud usage"},"content":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks.<\/p>\n<p><strong>Basic policies:<\/strong><\/p>\n<ul>\n<li>employee trainings on how to handle sensitive data in various situations<\/li>\n<li>advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need<\/li>\n<li>activity logs which log every detail of cloud activity, preserving a record of what each person views and changes<\/li>\n<\/ul>\n<p><strong>Secure infrastructure:<\/strong><\/p>\n<ul>\n<li>working with a cloud solution provider specialized in managing sensitive data, especially for businesses without a dedicated IT team to setup and monitor the cloud system<\/li>\n<\/ul>\n<p><strong>Redundancies:<\/strong><\/p>\n<ul>\n<li>keeping an offline backup, not connected to an internet-enabled network<\/li>\n<\/ul>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-3729 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='Video: the dark web'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/video-the-dark-web\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/10\/These-Scary-Things-Really-Happen-In-The-Dark-Web-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11084\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11084'>\n\t\t\t\tVideo: the dark web\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Apple Card review'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/apple-card-review\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2019\/08\/Introducing-Apple-Card-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-13551\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-13551'>\n\t\t\t\tApple Card review\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Video: how ready is the financial services industry for data analytics?'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/video-how-ready-is-the-financial-services-industry-for-data-analytics\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/09\/FinextraTV-SC-Measuring-the-industrys-tech-intelligence-around-data-analytics-150x150.jpeg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-15301\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-15301'>\n\t\t\t\tVideo: how ready is the financial services industry for data analytics?\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The following internal policies provide for maximum cloud data security and prevent unnecessary information leaks. Basic policies: employee trainings on how to handle sensitive data in various situations advanced access management which compartmentalizes departments and gives them access only to the parts of the cloud infrastructure they need activity logs which log every detail of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":3731,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,16],"tags":[184,49],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=3729"}],"version-history":[{"count":6,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions"}],"predecessor-version":[{"id":6727,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/3729\/revisions\/6727"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/3731"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=3729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=3729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=3729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}