{"id":2802,"date":"2016-04-19T14:19:54","date_gmt":"2016-04-19T14:19:54","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/the-60-second-data-security-checklist\/"},"modified":"2016-04-19T14:19:54","modified_gmt":"2016-04-19T14:19:54","slug":"the-60-second-data-security-checklist","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/the-60-second-data-security-checklist\/","title":{"rendered":"The 60 Second Data Security Checklist"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p>Concerned about <a href=\"https:\/\/lavaprotocols.com\/2016\/04\/19\/cloud-security-secured-not\/\" target=\"_blank\" rel=\"noopener\">storing all your data on the cloud<\/a>, especially since your business has a lot of sensitive information?<\/p>\n<p><!--more--><\/p>\n<p>Read this to see if you\u2019re on the right track.<\/p>\n<p><img decoding=\"async\" data-attachment-id=\"4367\" data-permalink=\"https:\/\/www.lavaprotocols.com\/2016\/04\/19\/60-second-data-security-checklist\/60-second-security-checlist-infographic-lava\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/04\/60-second-security-checlist-infographic-lava.jpg?fit=800%2C2000&#038;ssl=1\" data-orig-size=\"800,2000\" data-comments-opened=\"0\" data-image-meta=\"{\"aperture\":\"0\",\"credit\":\"\",\"camera\":\"\",\"caption\":\"\",\"created_timestamp\":\"0\",\"copyright\":\"\",\"focal_length\":\"0\",\"iso\":\"0\",\"shutter_speed\":\"0\",\"title\":\"\",\"orientation\":\"0\"}\" data-image-title=\"60 second security checlist infographic lava\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/04\/60-second-security-checlist-infographic-lava.jpg?fit=120%2C300&#038;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/www.lavaprotocols.com\/wp-content\/uploads\/2016\/04\/60-second-security-checlist-infographic-lava.jpg?fit=410%2C1024&#038;ssl=1\" loading=\"lazy\" class=\"aligncenter wp-image-4367 size-full\" src=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava-3.jpg\" alt=\"data security checklist \" width=\"800\" height=\"2000\" srcset=\"https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava-1.jpg 800w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava-4.jpg 120w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava.jpg 768w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava-Aug-04-2022-07-37-31-44-AM.jpg 410w, https:\/\/4843500.fs1.hubspotusercontent-na1.net\/hubfs\/4843500\/Imported_Blog_Media\/60-second-security-checlist-infographic-lava-2.jpg 610w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" data-recalc-dims=\"1\"><\/p>\n<h6><\/h6>\n<p><i><span style=\"font-weight: 400;\">Lava is an <\/span><\/i><a href=\"https:\/\/lavaprotocols.com\/crm\/\"><i><span style=\"font-weight: 400;\">authorised Salesforce Partner <\/span><\/i><\/a><i><span style=\"font-weight: 400;\">in Malaysia and has more than a decade of experience in cloud solutions which includes marketing automation, CRM implementation, change management, and consultation. We pride ourselves in not just being a CRM partner but in also understanding the needs of our customers and taking their business to the next level.<\/span><\/i><\/p>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This 60 second data security checklist tells you everything you need to know and do to keep your data protected in the cloud.<\/p>\n","protected":false},"author":1,"featured_media":2803,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18],"class_list":["post-2802","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-blog"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2024\/10\/agent-1238811_640.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2802"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2802\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/2803"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}