Different shows nowadays showcase characters hacking into the “mainframe” and obtaining essential data. Movies and series such as Start-Up, Money Heist, Mr. Robot, and Army of Thieves display scenes wherein hackers attempt to get data that they can capitalize into obtaining whatever they desire. These fictional situations would make one ponder how grounded it is in reality and whether the data we contribute and use in cyberspace is truly safe.
The internet is a collection of computer networks that exchanges data and media. These data are vulnerable to various types of cyber threats. These threats can be accidental or intentional and brought about internally or externally. Accidental mishandling of data is a common cyber threat that does not pose imminent harm or danger to oneself. It can come from sharing accounts or forgetting one’s user details. Phishing is one common cyber threat that can present a risk to one’s data.
The most popular operating mediums for storing and using data are cloud object storage and social media, both of which provide services at the highest levels that benefit users to make successful and dependable data storage possible. Not only does it benefit from the security it provides, but it can also be administered, backed up, and viewed remotely. As long as the necessary permissions are in place, this makes it accessible to any supported device, which may be a tangible advantage and of huge assistance in any scenario. Therefore, using these storage mediums is necessary for the efficiency and effectiveness of a certain function that users may require.
Below are several distinctions between cloud storage and social media as excellent online storage mediums:
The cloud pertains to any software program that uses the internet to store and process data rather than the device being used. This implies that you can access the data in these programs anytime through the internet without relying on specific devices. The servers that are being used by the cloud are handled by companies with several countermeasures against cyberattacks. The servers receive constant security updates and patches. This ensures that no new malware or hacking attempt can get through. The cloud also has firewalls that act as a gate to guarantee that suspicious traffic and activity cannot bypass and access essential files. Common cloud storages also create backup files to avoid loss of data due to mishandling or accidental events. Some cloud storage utilizes Artificial Intelligence to aid in handling the data in the servers; it acts as first-level security that analyzes traffic and ensures security measures are applied.
Social media are the common grounds nowadays for communication and entertainment. It is very accessible and user-friendly, with contents that are easily digestible and catered toward the general public. The data stored and used here are more personal and built towards the liking and preference of the user. Hence, common cyber threats are persistent in this medium. Various social media have taken several steps and measures to keep their users’ data safe. One preventive measure social media has to lessen cyberattacks is to lessen the bots present on its platform. Bot users can impose harm on the public as they can be abused and used in various ways, such as sending hateful and prejudiced comments toward someone. Some social media sites allow the usage of a VPN or virtual private network, which would allow one’s IP address to be hidden from potential attempts to gain information on a user. Most social media companies have a program called a bug bounty program that awards capable individuals who discover any bug and potential issues on the platform.
To sum it up, several precautionary measures are already in place to protect and ensure the security of the data we generate on the internet. Several companies are aware of the presence of cyber threats and are consistently putting effort into building a secure environment for their users. But, everyone should still take preventive measures to avoid being affected by these cyber attacks. When using the cloud, one must ensure that every file has a backup; if a file is important and confidential, it should be encrypted. When using social media, one’s account should have several steps in the authentication process to avoid other people accessing the said account. Our online data is quite secure, especially if we all take countermeasures to ensure its safety.