{"id":102092,"date":"2025-01-27T11:19:34","date_gmt":"2025-01-27T03:19:34","guid":{"rendered":"https:\/\/version-2.com\/?p=102092"},"modified":"2025-01-21T11:22:35","modified_gmt":"2025-01-21T03:22:35","slug":"the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2025\/01\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/","title":{"rendered":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs]"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"102092\" class=\"elementor elementor-102092\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium\" src=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\" width=\"1280\" height=\"720\" \/><\/p><div class=\"elementor-widget-container\"><h2 class=\"wp-block-heading\">Do You Know Where Sensitive Data Resides?<\/h2><p>Do you know where all sensitive data resides within your organization, or more importantly, where it resides in your customers\u2019 clouds? Those <a href=\"https:\/\/guardz.com\/blog\/threat-undetected-5-ways-cybercriminals-gain-unauthorized-access-to-your-clients-network\/\">unauthorized access<\/a> controls, excess permissions, inactive users, or misconfigured S3 storage buckets could be exposing terabytes of critical data by the minute.\u00a0<\/p><p>Research showed that more than <a href=\"https:\/\/www.securitymagazine.com\/articles\/99768-report-finds-exposed-sensitive-data-in-more-than-30-of-cloud-assets\" target=\"_blank\" rel=\"noopener\">30% of cloud data assets<\/a> contain sensitive information. But that\u2019s where the problem begins for a busy MSP. Without clear visibility into where sensitive data resides or how it\u2019s being accessed, securing it becomes nearly impossible, often resulting in a massive breach.\u00a0<\/p><p>That\u2019s why we put this checklist together on <strong>The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud<\/strong>. But first, do you know who has access to what?<\/p><h2 class=\"wp-block-heading\">Securing Data in the Cloud: Who Has Access to What?\u00a0<\/h2><p>According to research conducted by Microsoft Security in their 2023 State of Cloud Permissions Risks Report, found that over 45% of organizations have AWS access keys that have not been rotated for at least months. The report also found that <strong><em>40% of identities are inactive<\/em><\/strong> in AWS environments.<\/p><p>Let that sink in for a moment.\u00a0<\/p><p>How can MSPs determine who has access to which type of data across multiple cloud platforms and ensure it remains secure?\u00a0<\/p><p>Now factor in third parties.\u00a0<\/p><p>Third parties may have unmanaged access permissions that are out of your scope. Any of those permissions can provide a backdoor for attackers to exfiltrate sensitive data.\u00a0<\/p><p>And the risks aren\u2019t only limited to cloud environments\u2026<\/p><p>MSPs must constantly worry about shadow IT, where employees use unauthorized cloud services and other SaaS applications without the consent or knowledge of IT. This is a big problem.\u00a0<\/p><p>Those unauthorized cloud accounts and user roles can bypass security protocols (assuming they\u2019ve been implemented) and leave your attack surface completely vulnerable. Even the most \u201charmless\u201d-looking Chrome extension, such as Grammarly, can bring about major security threats since it has access to documents that contain financial transactions, proprietary information, and other PII.\u00a0<\/p><p>Once you agree to those terms, your data becomes vulnerable to those third parties. Those terms of service are often long, complex, and difficult to fully understand, making it easy for employees to overlook the risks associated with granting access.<\/p><p>Sure, data privacy laws have become more strict, but they can\u2019t protect you from the risks posed by unauthorized access if you don\u2019t know where sensitive data resides.\u00a0<\/p><h2 class=\"wp-block-heading\">Data at Rest vs. Data in Transit<\/h2><p>In order to secure data, you first need to have a better understanding of the different types of data.\u00a0<\/p><p><strong>Data at rest<\/strong> refers to data that is stored and not actively being transmitted or processed, such as in databases, file servers, or cloud storage.\u00a0<\/p><p><strong>Data in transit<\/strong> or in motion, on the other hand, refers to data that is being transmitted from one location to another, such as emails or cloud-based API calls.\u00a0<\/p><p>All data, whether at rest or in transit, should be secured using strong encryption. This prevents unauthorized access to stored files on servers or cloud services (data at rest) and mitigates risks such as Man-in-the-Middle (MITM) attacks during transmission (data in transit).<\/p><h2 class=\"wp-block-heading\">The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [Complete Checklist]<\/h2><p>Access permissions should be limited by default. But this is the part that gets tricky for MSPs.<\/p><p>Why?<\/p><p>Because an MSP may not be fully aware of how many permissions and identities are circulating within cloud environments. When was the last time your team conducted a comprehensive review of user permissions and roles across all cloud platforms?\u00a0<\/p><p>A month ago? A year? Longer?\u00a0\u00a0<\/p><p>Now multiply those accounts, permissions, and identities when dealing with multiple clients simultaneously, and it\u2019s not so hard to imagine that a data breach is only a single account login away. Research taken from <a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/threat-horizons-report-august-2023\/\" target=\"_blank\" rel=\"noopener\">Google Cloud\u2019s 2023 Threat Horizons Report<\/a> found that 86% of data breaches involve stolen credentials.<\/p><p>So, yeah, the threats are very real. No need to fall into that trap.\u00a0<\/p><p>Below are the most common cloud risks, along with best practices you can implement to prevent them and secure sensitive data.<\/p><figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Cloud Risk<\/strong><\/td><td><strong>Guardz Best Practices\u00a0<\/strong><\/td><\/tr><tr><td>Excessive access permissions<\/td><td>\u2013 Implement the principle of least privilege across all cloud accounts<br \/>\u2013 Conduct periodic audits of user permissions\u00a0<br \/>\u2013 Provide temporary access to sensitive resources and revoke access immediately after the task is completed<\/td><\/tr><tr><td>Inactive identities\u00a0<\/td><td>\u2013 Remove inactive users from cloud accounts, such as employees who have left the organization or third parties whose contracts have expired<br \/>\u2013 Enforce <a href=\"https:\/\/guardz.com\/blog\/mfa-in-cybersecurity-4-types-to-secure-msp-client-data\/\">multi-factor authentication (MFA)<\/a> across all cloud accounts\u00a0<br \/>\u2013 Monitor privileged accounts closely and deactivate those that are inactive for excess periods of time (30-60 days).<\/td><\/tr><tr><td>Cloud storage misconfigurations (e.g. S3 buckets left public)\u00a0<\/td><td>\u2013 Restrict public access to storage buckets \u2013 this is absolutely essential<br \/>\u2013 Regularly rotate access keys and secrets every 90 days<br \/>\u2013 Enable versioning for cloud storage objects and establish regular backup procedures<\/td><\/tr><tr><td>Third parties\u00a0<\/td><td>Cloud storage misconfigurations (e.g., S3 buckets left public)\u00a0<\/td><\/tr><\/tbody><\/table><\/figure><p><br \/>But there\u2019s a better way to manage sensitive data in the cloud.\u00a0<\/p><h2 class=\"wp-block-heading\">Keep All Sensitive Cloud Data Secured with Guardz\u00a0<\/h2><p>Who has cloud access permissions to critical data? Don\u2019t wait until an account gets compromised to find out.\u00a0<\/p><p>Guardz examines all digital assets within the customer cloud environment by scanning files and folders for excessive sharing permissions, misconfigurations, and other types of risky user behavior that can lead to a breach.<\/p><p>Prevent compromised credentials with <a href=\"https:\/\/guardz.com\/data-loss-prevention\/\">Guardz cloud DLP<\/a> and unified cybersecurity platform.\u00a0<\/p><p>See where all sensitive data resides across your organization and client cloud environments.\u00a0<br \/><a href=\"https:\/\/guardz.com\/schedule-a-meeting\/\">Speak with one of our experts<\/a> today.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86d84e0 elementor-widget elementor-widget-button\" data-id=\"86d84e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/guardz.com\/distributors\/v2\/?utm_source=web&#038;utm_medium=v2sg&#038;utm_campaign=guardz&#038;utm_content=trial\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Start Free Trial<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"76994\" class=\"elementor elementor-76994\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Guardz<br \/><\/strong>Guardz is on a mission to create a safer digital world by empowering Managed Service Providers (MSPs). Their goal is to proactively secure and insure Small and Medium Enterprises (SMEs) against ever-evolving threats while simultaneously creating new revenue streams, all on one unified platform.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Do You Know Where Sensitive Data Resides? Do you know w [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1276,1305,61],"tags":[1077,1277],"class_list":["post-102092","post","type-post","status-publish","format-standard","hentry","category-guardz","category-1305","category-press-release","tag-1077","tag-guardz"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2\" \/>\n<meta property=\"og:description\" content=\"Do You Know Where Sensitive Data Resides? Do you know w [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-27T03:19:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs]\",\"datePublished\":\"2025-01-27T03:19:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/\"},\"wordCount\":958,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\",\"keywords\":[\"2025\",\"Guardz\"],\"articleSection\":[\"Guardz\",\"2025\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/01\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/\",\"url\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/\",\"name\":\"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\",\"datePublished\":\"2025-01-27T03:19:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/guardz.com\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/guardz.com\\\/blog\\\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/","og_locale":"zh_HK","og_type":"article","og_title":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2","og_description":"Do You Know Where Sensitive Data Resides? Do you know w [&hellip;]","og_url":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/","og_site_name":"Version 2","article_published_time":"2025-01-27T03:19:34+00:00","og_image":[{"url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"9 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/01\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs]","datePublished":"2025-01-27T03:19:34+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/01\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/"},"wordCount":958,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp","keywords":["2025","Guardz"],"articleSection":["Guardz","2025","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/01\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/","url":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/","name":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs] - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#primaryimage"},"image":{"@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#primaryimage"},"thumbnailUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp","datePublished":"2025-01-27T03:19:34+00:00","breadcrumb":{"@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#primaryimage","url":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp","contentUrl":"https:\/\/guardz.com\/wp-content\/uploads\/2025\/01\/The-Dos-and-Donts-of-Managing-Sensitive-Data-in-the-Cloud.jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/guardz.com\/blog\/the-dos-and-donts-of-managing-sensitive-data-in-the-cloud-a-complete-checklist-for-msps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"The Do\u2019s and Don\u2019ts of Managing Sensitive Data in the Cloud [A Complete Checklist for MSPs]"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-qyE","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102092","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=102092"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102092\/revisions"}],"predecessor-version":[{"id":102099,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/102092\/revisions\/102099"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=102092"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=102092"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=102092"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}