Quantum computers are going to upend our computer security model and now is the time to mitigate against this eventuality. As discussed previously, the first (and most important) security measure you can make right now is using a good password.
After you have a great password policy, the next security item YOU should be concerned about are: steal now, decrypt later (“SNDL”) attacks. Which are straight forward, and easy to understand. A threat actor (hacker) steals YOUR encrypted data and either attempts immediate decryption attacks – or if that fails – simply holds onto it, waiting for advancement in computing technology to break your stolen data’s encryption.
So, what should you do about this existential threat to your data? Do not entrust third parties (Cloud Company Applications) with your valuable data. For example, its very tempting to use products such as MS Azure, Google Mail, Docs & Drive & any number of other similar cloud computing applications (Clio for Lawyers, Innago Tenant for Commercial Real estate, Clustdoc for Accountants etc…) But a simple search returns that MS Azure was hit, Google Docs was hit & Clio is a target. As the quote from this article plainly states: “Given the sensitivity of the data legal professionals routinely handle, cybersecurity can’t be an afterthought”; and that sentiment goes for every professional service provider.
At IRQ, we eschew popular cloud implementations for independent cloud infrastructure. That is, the connivence of the major players without the huge target. There is no such thing as a computer cloud, it’s a server. All servers have a physical location and can (and probably will) be attacked. Whether the attack is successful depends on the attacker’s skill, motivation and time. Thus, an attacker will spend more time and effort trying to attack Microsoft’s servers than the servers @ Hostinger. Same goes for Google, they have a bigger target on their back than Bluehost.
And this is where YOU can mitigate your risk, with a sound “cloud” solution from IRQ Solutions hosted on an uninteresting (to most attackers) target server.