At Aptus we believe you should be able to work seamlessly anywhere, anytime.  Which means being able to access your business information and files on any device wherever you might be.  The only way this is possible is by relying on the “cloud”.

So what is the cloud?

The “cloud” in computing terms, is not that fluffy stuff in the sky, but external servers that hold data in different locations, that you connect to through an internet connection.  Instead of saving data in one place on your hard drive that you can only access by jumping on your computer, you save your data to external servers, and access the information through secure logins from almost any device that can connect to internet.

You’re probably already using the cloud

If you use internet banking, social media, email, guess what?  You’re using the cloud!  The information you access through the web is kept on those servers we mentioned earlier, and not on your computers hard drive, which allows you to view information immediately.  Every time you log on to see your account balances, load an image to Facebook or read an email, this data is being saved so that you can access it, and even share it, again and again.

How is using the cloud beneficial?

Using the cloud makes your business more mobile, with you being able to grab the information you need quickly, without being tied to a desk to retrieve it.  With the cloud there is no need to worry about backups, losing data and upgrading applications.  The cloud takes the stress out of computing, all you need to do is remember your login details!

Protecting yourself in the cloud

Security is a constantly-evolving issue for the tech industry and we strongly encourage all technology users to remain vigilant about the online solutions they use.

Using a strong password, a combination of unique random letters, numbers, characters and punctuations, is the best way to ensure your password will never be guessed.  Along with using different passwords for different sites.

Enabling two-step verification is becoming more popular as it requires 2 different types of data to be entered before allowing access, usually your password, and a generated code sent in the form of a text message.  Using a two-step verification code will alert you when someone is trying to access your account.