TRONoffice is a back-end web application for managing the codebook, finances, material operations and a complete overview of operations with analyses. It serves as support for the TRONpos cash register system. TRONoffic can be accessed with a username and password from almost anywhere with an Internet connection and from any device (personal computer, laptop, smart tablets and phones). Data security comes first, so we follow the most up-to-date guidelines and standards when storing data.

In doing business and ensuring data security, a problem often arises if the company does not have a system for making backup copies of data. We must be aware that it is important not to have the most sensitive data stored in only one place. In terms of security, it's a good idea for the company hosting the cloud solution to have two-factor authentication enabled. As the name suggests, two-factor authentication requires us to provide two pieces of information when logging into a website. When we log in to the site, we enter our username and password as usual, then wait for an additional code to be sent to our e-mail address or phone, which we must enter when logging in. This extra step greatly protects us from hacking and access to our data.

Data archiving in the cloud

A server only has a certain amount of storage space and availability, or when we reach this limit, we will need to purchase an additional server to increase the additional space. For example, let's imagine that we are approaching the capacity of the current servers. Now let's imagine that our marketing team is running a promotion and by doing this, the company is getting a lot of traffic. Our current servers are almost always at full capacity, which means that we do not have the availability for these additional users, and we will have to buy a new server to accommodate the additional availability, which requires time and money. Later, we may still use a small amount of resources from the new server, or they mostly remain unused. This type of situation is common for businesses with seasonal turnover or businesses that are growing. With the cloud, we can scale up or down whenever needed and only pay for the resources we use, making the cloud extremely cost-effective. One of the biggest differences between cloud infrastructure and on-premises infrastructure is that we don't manage physical equipment. This means that we don't have to worry about hardware space, power supply or cooling. These costs are often forgotten or can add up quickly. Depending on how many servers the company needs, it is necessary to rent additional space for this hardware. The power and cooling infrastructure is a 24/7 task. With the cloud, we don't have these additional costs (Executech, 2021.).

Data archiving is an important part of data life cycle management that allows us to preserve all important information. Data archiving can help administrators and end users easily find files in a fast and efficient manner. A data backup is a copy of data created for the purpose of data protection and recovery. Data backups contain critical information necessary for rapid recovery during data loss or other disasters. The data archive contains data that is kept for the purpose of long-term storage of information. Data archives often store data that is rarely accessed and is not critical for recovery or necessary for business continuity. Data archiving is often created as part of an overall data lifecycle management program. Organizations create data archiving policies, but the process is then fully automated by archiving software (Cloudnetapp, 2021.).

Strong data security

Why is cloud storage so secure? First, the servers are located in warehouses that most workers do not have access to. Second, files stored on cloud servers are encrypted. This means that they are encrypted, which makes it much more difficult for cybercriminals to access.

TRONoffice uses the HTTPPS (Hypertext Ttransfer Protocol Secure) protocol, which uses the SSL/TLS protocol to encrypt communication so that attackers cannot steal data. SSL/TLS also verifies that a website's server is who it says it is, preventing spoofing. This is somewhat stopped by a type of cyber attack. With HTTPS, data is encrypted in both directions in transit: going to and coming from the origin server. The protocol ensures the security of communication, so that malicious persons cannot see what data is being sent. Therefore, usernames and passwords cannot be stolen during transmission when users enter them into the form. If websites or web applications need to send sensitive or personal information (such as bank account information) to users, encryption protects that information as well (Cloudflare, 2022.).

Backup and restore

Since all data is stored in the cloud, backing up and restoring the same data is relatively much easier than storing it on a physical device. Most cloud service providers are usually skilled enough to handle the data as well, so the entire backup and recovery process is much simpler than other traditional data storage methods. The current trend is for users to outsource data to service providers who have sufficient storage space at lower storage costs. A secure and efficient storage protocol is used to ensure the confidentiality and integrity of data storage. This protocol uses the construction of elliptic curve cryptography and uses a specific storage sequence to confirm data integrity (Spoorthy et al., 2014., pp. 309-310).