Google Drive Encryption is Easier Than You Think Adopting on premises data security practices in the cloud can be difficult. Organizations are reevaluating traditional approaches – and encryption is no…

Google Drive Encryption is Easier Than You Think

Michael Gleason

I spend my days (and nights) explaining how the strengths of the cloud - high availability, scalability, and interoperability - can help us overcome what is often considered its greatest weakness: security.

Share

CloudLock - Cloud Security

©iStockphoto.com/Rawpixel

Adopting on premises data security practices in the cloud can be difficult. Organizations are reevaluating traditional approaches – and encryption is no exception.

The ultimate challenge? Balancing data security while maintaining the user experience your users and peers are accustomed to. If you’re not careful, encryption can impede users and encourage the adoption of alternative unmonitored channels, introducing unnecessary data exposure risk.

The good news? An effective and user-centric approach to encryption may be easier than you think. Here are a few basic steps to consider when getting started. (Think you’re ready for the next step? Then download our complimentary Handy Guide to Cloud Data Encryption.)

1) Discover. First, identify what data is sensitive and merits encrypting. Define what constitutes sensitive information based on existing data governance policy and pertinent compliance regulations.

2) Consolidate for Control. Now that you know what you’re working with, consolidate the data into a few key repositories to improve management practices. Make sure your users adopt the same organizational system and analyze the data’s growth patterns to identify and mitigate data sprawl.

3) Select Appropriate Technology. Now, take the final step: encrypt! Should you opt for a 3rd party solution, make sure it:

  • Maintains User Experience. The solution must be seamless to the end user, allowing for the full functionality of the platform while providing a high degree of security.
  • Is Compatible Across the Board. The encryption solution needs to be compatible with all the platforms where sensitive data may reside – including mobile devices.
  • Makes Encryption Easy. The encryption solution should be actionable from the discovery point to allow for rapid encryption of files containing sensitive information.

With a few simple guidelines, encryption in the cloud isn’t as daunting as some would have you believe. Learn the do’s and don’ts of encryption in the cloud by downloading our complimentary eBook: Data Encryption in the Cloud: A Handy Guide, featuring tips and tricks to get started, best practices to keep in mind, and more.

CL_blog_CTA_Data-Encryption-eBook

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close