Cyber Security in Cloud Computing: Tips to Secure Your Data in the Cloud

Cyber Security in Cloud Computing: Tips to Secure Your Data in the Cloud

Tips to protecting your data stored in the cloud, with a focus on data privacy, availability, protection and security.
The impact of cloud computing in the business world today has been revolutionary and I say it is the future for businesses that are innovative and embracing technology. Companies staffs can have access to files and apps at any time which makes it easy to collaborate between themselves and also for those who work from home or those overseas. Technology has helped with the rise of remote workers which has made quite a number of people achieve a better work-life balance, saving a lot on transportation costs and working more effectively.

Without cloud computing, working remotely might not have been as effective and secure, because there would be a lot of back and forth emails between colleagues. They would be sharing large files and data via email which increases the chances of the data been accessed by those who are not meant to and probably the size of the file will be too large to be sent at once. All these would be a lot messy and actually lead to staffs been very unproductive. Thanks to cloud computing, the ability for workers to access files and data easily at any time from remote locations over the internet has led to an increase in productivity amongst other things.

While cloud computing comes with a lot of benefits, we can not be too sure how secure our data is, most especially the ones stored in a public cloud.  And with the rise in the recent hacking incidents of big companies, one can not rely completely on the cloud services provider to secure our data. Once you decide to use cloud computing, you no longer have control, your data could be stored anywhere in the world which varies with the cloud service provider you use.  Cloud computing means you’re outsourcing and trusting a cloud service provider to keep your data, files, apps and transactions safe. Because of this, companies and individuals should increase their responsibility for protecting the data at all costs in the cloud. That is why data privacy and security in cloud computing is extremely important.

Image Source: Crouch Tech

Common Cloud Computing Security Risks/Threats

  • Intellectual property loss or theft
  • Data breach and data leak
  • Poor access management
  • Malware infections
  • Hijacked accounts
  • Loss of control over end-user actions – Insider threats
  • Compliance violation and regulatory actions
  • Hacked interfaces and insecure APIs


The number of businesses migrating to the cloud has increased yearly and so as the number of cyberattacks. A lot of people also use the cloud now for personal use and some of the free cloud services providers are Google Drive, Dropbox and One Drive. To avoid cloud security issues, here are some tips you can implement as a business or as an individual.

1. Multi-factor Authentication

Most cloud security services now offer multi-factor authentication, where you enter your password, and receive a mobile phone notification with a randomly-generated one time use string of numbers which is only active for a few minutes. If not automatically offered, you should check if your provider has the option and then activate it.

Image Source: Monash

2. Monitor Your Cloud Environment

The best way to stay on top of your account is to monitor your cloud activities for any unexpected or suspicious activity. Monitor staffs login control, and in addition, limit what information they have access to. 

3. Encryption

Data encryption is a security method where information is encoded and only the person with the encryption key can access or decrypt it. Encryption stops unauthorised access of data, but it does not mean its secure.

Image Source: Pixel Privacy 

4. Frequent Data BackUps

Backing up your data frequently is one of the most effective ways to prevent data loss. It is important to schedule this to be carried out often – add to your calendar. Doing this would ensure that you have an emergency backup if there was a case of a failed cloud service.

5. Check and Test Your Security Measures 

Testing security measures will make a significant difference. You can hire penetration testers to test your system’s security level. Penetration testing is a process of identifying security vulnerabilities in an application or computer system.

Image Source: Red Team Secure

6. Use of Anti-Virus 

Installing anti-virus can secure your data from malware and phishing attacks. You can plan daily or weekly system scan to check for any risks.

7. Use Very Strong Passwords

I know you might have heard this over and over again, but you will be surprised at the number of people that still use their pets name as their password or a combination of their pets name along with their date of birth. I took an Introduction to cybersecurity course where I learnt a few password tips. Your password should contain a mixture of caps and small letters, add more than 1 symbol, replace letters to similar-looking symbols. There are a lot of sites that offer tips on creating a strong password. Besides creating a unique and strong password, it is also of great importance to change them frequently and use different passwords for different platforms. Example: Your social media password should not be the same with your email.


Cloud computing is the future and with no doubt comes with a lot of benefits, but you should bear in mind that cloud vendors security assurance is not guaranteed. They know they have to do their cybersecurity part, but at the end of the day, the organisation is the one responsible for their customer’s data and not the cloud vendor likewise if they become a victim to a ransomware attack. So adopting cybersecurity measures from your end alongside staying informed, verifying your cloud vendor security policies and educate yourself.


If you like this post or have extra tips on ways to secure our data in the cloud. Or is this your first time learning about cloud security? Or are you already aware and have taken steps to secure your accounts. Do drop a comment below I will love to hear from you.

Data & Information Management: Reflection on class activity – Data Breach within a Hospital

Data & Information Management: Reflection on class activity – Data Breach within a Hospital

I have been waiting a while to learn more on data and information management and the day finally came which was yesterday the 18th of November.

I would not say I got much from the lecture itself as I anticipated, but I enjoyed the class activity as I got to collaborate with other students. We were in a group of 5 where we discussed different ideas on what we can do to make sure the situation does not happen again.

What was the situation?

A general employee of a hospital was caught after a patient heard confidential information about herself from friends and neighbours and called the hospital, which launched an investigation.

The University Hospital employee was caught in the act and as the hospital department head, the offender’s employment was terminated immediately and a letter of apology was sent to the patients. 

Class Activity on Data Management and Privacy

A local TV reporter asked what is being done to make sure it doesn’t happen again? And our answer will be played on the local news. We had 15 minutes to prepare our answer which was not to be longer than 30 seconds long and the TV reporter will phone back in 15 minutes to audio record our answer.

Group Solution

We came up with this:

We sincerely apologise about this incidence and have decided to restrict employee access by ranking according to duty level. We will also be adopting a daily security risk analysis process and each medical file would be password protected.

Quite short I know! We were timed when reading it out loud in class, and it came to be about 18 seconds if I remember correctly. We went to discuss our idea, and the lecturer advised that password protection might not necessarily be the right step because the files would have been password protected initially and nurses and doctors will need access to medical records when treating patients. We also discussed the 2 other points which the lecturer mentioned were the best ideas to implement because restricting employee access by levels are of huge importance. For example, administrative staffs like receptionist do not need to have access to patient’s medical files. If they can also find a way to restrict nurse’s access on some top confidential information, that only the major medical practitioners like surgeons or consultants need to access because they might not give into financial bribes to leak medical information of their patients.

During the group activity, we were discussing if the security risk analysis should be carried out on a daily, weekly or monthly basis. I personally said daily because waiting on weekly or monthly, a lot of damage might have been done before anyone is aware. If the hospital as a dedicated cybersecurity team, there is no reason why a daily security audit should not be carried out. Some said it might be too much of a task to be carried out on a daily basis which I reason with as well. The security professionals will be in the best position to give that advise we concluded and decided to stick to a daily basis as part of the data protection guidelines of the hospital.


I have further read up on the data management and the general data protection regulation (GDPR), it is important for organisations to take data protection very seriously and have a Data Protection team so they can adhere to GDPR. And for hospitals, they should appoint a Data Protection Officer and if they do not, they still have to comply with other requirements of the GDPR.

Increasing security when it comes to employee access is crucial and any organisation must have a strict way of safeguarding personal data, checked often to avoid situations of employees stealing customer’s records. A true-life story of such an event can be found here.


You can contact me here or via any of my social media accounts below:




How Cloud Computing Empowers Digital Transformation

How Cloud Computing Empowers Digital Transformation

Cloud computing is now a basic business tool that has gained a lot of importance in most organisations. 

With the rise in technology, ranging from Big Data, IoT, advanced analytics, Machine Learning, Artificial Intelligence, and of course the Cloud are all enablers of digital transformation rapidly forcing organisations to drop traditional business models and find ways to be innovative in order to satisfy their customer’s needs and remain competitive in this digital era. Organisations that embrace innovation are the ones experiencing transformation and growth while the ones who stick to their traditional business models are experiencing little to no growth.

Innovation brings digital transformation into work to help organisations stay ahead of the competition. Most companies use cloud computing to help them with their digital transformation because it gives them the fastest access to its functionalities along with flexible data storage and on a pay-for-use basis. With the cloud, you can work from any location on any device to get access to your applications and files.

Digital transformation is about integrating digital technologies into all areas of a business which results in how a business operates and how value is been delivered to their customers. In simple terms, it’s about having a vision of how you bring people, data and processes together. The customers and customer experience, stakeholders, processes, purpose and end goals of the business are all key to a successful digital transformation. The digital transformation leader/strategist has to apply the systems thinking approach to the project in order to connect the dots and reach the different goals of the organisation as they are all interconnected.


Digital transformation is about finding newer and innovative business models that will enable businesses to stay relevant and thrive in the digital world. A company needs to leverage technologies like machine learning, big data analytics, internet of things (IoT), chatbots etc and the cloud is the spark that fuels these innovations. Cloud computing is the one that can provide the services needed for the storage, IT infrastructure, and heavy computing needed for all these technologies.

Here is how the cloud enables digital transformation:

1. Flexibility

Cloud computing provides an organisation with the required infrastructure, computing resources and platforms on the go offering them flexible ways to accommodate unpredictable demand and planned growth. Businesses can scale up or down at any time with cloud services, giving them flexibility, and agility which gives them advantages over their competitors.

2. Cost-Effective

Cloud computing cuts out the capital expenditure of buying, managing and maintaining your own hardware or software. Companies only pay for what they use and can scale their resources based on their business requirements.

3. Improved Data Security

Storing the database in-house increases the risk of cyber-attacks, data breaches, losing critical information, system shutdown and much more. With cloud computing, there is a reduced risk of system failure especially when dealing with big data and companies can creating a number of backups for their data.

4. Faster Prototyping

For digital transformation to be successful, an organisation needs to continually innovate, test, implement and repeat. The cloud helps with this, without the company setting up complex infrastructure. During the experimentation phase, the company can test and deploy different applications that will drive business results.

5. Collaboration Efficiency

The cloud environment has proven to improve collaboration amongst groups, teams who have access to the same files. It eliminates the communication limitations of sending emails back and forth hence streamlining processes and getting more work done in less time. 

A company can also control the level of authority of its users by sharing files with only those who need to have access to it. Overall it helps create a teamwork and collaboration environment.

Cloud keeps Innovation going and it is the Future

Digital transformation is a means of survival for businesses and cloud is the catalyst for this transformation. Businesses are in a transition state and they have to embrace new technologies to meet up with the ever-changing digital needs of their customers.

With the right vision, strategy, methodology, and platform, a modern cloud can spark end-to-end digital transformation – Build with Google Cloud.

Cloud computing leverages scalability, and reliability that encourages easier collaboration and reduces investment costs for organisations.

I will like to know what your view is on the future of Cloud Computing. Kindly drop a comment below, thanks.

Learn to Code for Cybersecurity: 100 Days of Code Challenge

Learn to Code for Cybersecurity: 100 Days of Code Challenge

From my research, people can learn to code by themselves using online resources without having to spend thousands on going to the university or a coding boot camp. Honestly, when I started researching how to learn to code, I came across a few boot camps and was itching to attend one.

I like the fact that you get to learn with others and the one to one interaction with the teachers. When I looked at the figure I have to spend to learn to code, it’s not what I could afford right now alongside paying for my master’s degree. I decided to go the route of teaching myself how to code. While attending a boot camp is interactive and good, your learning success & professional development depends on how many hours you dedicate to self-study. That means boot campers are also a good fit to join the challenge.

I have done my research and looked at the in-demand skills in my location to know what skills are in demand for a career in cybersecurity and that’s why I chose Python and JavaScript for a start. I suggest you do the same before investing your time and money into learning a coding language.

I have met quite a few supportive people online who are also on their journey into information security who are currently learning to code by themselves and others towards a different career path, from business analysts to software testers, to web developers to data scientists. We are gradually forming a community here and it’s nice seeing people coming together to support each other.

It does not matter the career path you are on, as long as learning a programming language is a necessity for you, you can take part in this coding challenge to help you become a better programmer or start a new career.


  • Code for a minimum of one hour every day for the next 100 days
  • Tweet/IG Post your progress daily using the hashtag #100DaysOfCode

Learning Goal:

  • Complete the 100 Days of Code

Community Hashtags:

You do not have to use all the hashtags, use the ones applicable to what you are learning. It’s a guide for you to see what’s going on, and join the conversation. Find more information on the 100 days of code challenge.

Twitter: #100DaysOfCode #100DaysOfPython #100DaysOfJavaScript #LearnJavaScript

Instagram: #100DaysOfCode #LearnJavaScript #CodeNewbie #LearntoCode #LearnPython


Reading Resources:

  1. Automate the Boring Stuff – Online Book
  2. Cracking Codes with Python – Online Book
  3. Learn Python 3 the Hard Way
  4. Python Crash Course – Amazon

You don’t have to use the online books, you can get the hard copy from your local or university library, or purchase one. I will be getting the hard copy from my university library, I’m not a huge fan of online books.

Tutorial Resources:

Resources I’m using at the moment:

Community Suggestion Resources👏:

Fun & Interactive Apps to learn to code for free directly on your phone. Download on the App Store and Google Play. Suggested by yennie_e

Suggested by @cyB3rwj0yjnzgrp 


Reading Resources:

Tutorial Resources:

Community Suggestion Resources👏:

Suggested by @yennie_e

  • Interactive Phone App to Learn JavaScript: Grasshopper

Suggested by @cyB3rwj0yjnzgrp 

By week 15, we should be confident to contribute to open source projects. Not sure how it works at this stage, so here are links to guides that can help.

  1. Contributing to an open-source project: How to get started
  2. How to get started with GitHub – Beginner Tutorial
  3. How do I start working with OpenSource and Git Hub?

Do let me know in the comment section if you find this valuable and will be joining the challenge. If you do have other contributions or suggestions, also drop them in the comment section, I’m very open to learning and I believe it will help other learners.

How an MSc in Digital Business prepares me to work in cybersecurity

How an MSc in Digital Business prepares me to work in cybersecurity

I have been doing business online since graduation in 2012 – and it’s now time to move my career in an advanced direction of cybersecurity.

After graduating in 2012 with a degree in Accounting, it was challenging finding a job. Thanks to God, I was already selling hair extensions and wigs online, so I continued with that. In December 2016, had a setback and decided to discontinue the business early 2017.

“Sometimes life will hit you in the head with a brick, don’t lose faith”. – Steve Jobs

My husband and I decided to relocate to the UK since we have been contemplating for a while. Why? Because of the diversity and opportunities available for people of colour, which was a huge issue we faced in Ireland.


 Very simple, childcare cost.

I was better off working from home, with a few days in the office, and still be able to be with my kids and not spend a lot on childcare. While I was enjoying it, I still felt that loneliness of working by myself.  Now my three kids are all grown and in school, and childcare is a bit more reasonable.


While researching for the best course, that’ll help me in all areas and not limit my prospects; I came across the MSc in Digital Business at the University of Salford. I went through the modules, and I discovered it had so many elements to it. One of the modules I was already learning online, which is the social media marketing module, while other modules were topics of interest.

Course Modules:

  • Digital Business and Entrepreneurship
  • Information Systems and Digital Transformation
  • Project Management, Leadership and Skills, Planning and Control
  • Search and Social Media Marketing

Plus an Industry collaboration project where I can choose to do a work placement, internship, or strictly dissertation. I am hoping to be able to do a work placement and hoping to secure one before the end of this year to start in February 2020.


We now live in a digital world, and all organisations are either a digital company or looking into digital transformation. I felt it would be helpful to study this degree, so I can be employable and be an asset to any organisation. Luckily for me, my degree links to cybersecurity, because organisations looking into digital transformation must also look into security transformation as well.


When it comes to online research, I think I’m close to an expert because you name whatever it is you are looking for, as long as it’s online, I will dig it out, and this is what everyone around me says, especially my husband. After my first module, I decided to start looking into what exactly I will love to do after completing my degree in 2020.

Then the research began into different industries, available jobs, and the opportunities out there. I came across this job at Deloitte, and I thought what a fantastic opportunity, but not for me at the moment because I’m already studying full time. I kept on with the research and found out that just 17% of UK tech workers are female, and the industry needs a more diverse talent.

Decided to research deeper into different careers in technology and came about cybersecurity and immediately felt an instant connection with it, plus it suited my interest and also the new skills I’ve been acquiring at Salford Business School.


Cybersecurity is the name given to the technologies and processes set out to protect online data from attacks and unauthorised access. These cyberattacks aim to gain access, change or destroy sensitive information; extort money from users; or disrupt normal business processes, and it does cost the UK billions of pounds, causing untold damage and threatening national security.

You might be wondering how I can achieve this dream of mine with no technology background. Well, I’m happy to inform you that not all cybersecurity roles are technical and you don’t need a computer science degree, and for me, it’s through determination, and continuous learning. I am looking to transition into a Cybersecurity Consultant in Manchester or anywhere in the North West of England but also open to other roles in cybersecurity. I have done my research and know that I will need some training and certifications to enter into the industry.

Here’s what I intend to start with:

  • Develop my programming skills: Python, Hypertext Markup Language (HTML) and JavaScript.
  • Learn the basics of administering an operating system. I have concluded that Linux will help me become employable quickly.
  • CompTIA Security+, and CompTIA Network+

Getting certified is excellent, but I have no intentions of letting them hold me back, an internship is my primary goal to get me started. I know this new career path is going to be challenging, and I’m ready to step out of my comfort zone to achieve my dreams.

“If your dreams don’t scare you, they are too small.” – Richard Branson

Currently learning how personal branding and networking plays a significant role in one’s career; hence, the reason for starting this blog and writing this article. I will be sharing my journey, thoughts and more through this blog.

I’m delighted I made the right master’s degree choice. I have learnt vital skills needed to excel in digital organisations. 

“It is never too late to move your career in a different direction; I’m a proud wife and mum, and I have enjoyed the years I have worked from home while staying with my kids. Even though life has knocked me down so hard in the past, I have picked myself up for a fresh start. Now it’s time for mummy to fulfil her dreams”.

Please do drop a comment if you enjoyed the read; I will love your feedback, and you can contact me here or via any of my social media accounts LinkedIn and Twitter.