To find data in the cloud there are a few approaches you can take — each of them varies, depending on the service. Identifying unencrypted, approved transactions is a good first step. Restricting access to the storage locations on a “need to know” basis. Encryption and/or restricted access could be required if the data is highly valuable. Never forget to provide your users with a method of encrypting data when stored locally or on the network, says John Defterios.”]

