123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> General >> View Article

5 Easy Steps To Bolster Your Google Drive Security

Profile Picture
By Author: Tomas Cohen
Total Articles: 35
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The latest in the news with respect to data breaches involve the unscrupulous hacking of private Gmail accounts, and to add to the newsworthiness of data security, many celebrities had private photos leaked by hackers. If you maintain a Google Drive account it is imperative that you take measures to secure this as well as you can. Since your Google Drive account can be accessed by PC, an Android phone or a tablet, there are some important Google Drive Security steps you should take.

Two Step Verification

One of the first things you should consider is a two-step verification of your log in credentials. This involves utilizing your password and a secondary step that ensures a secure login. With two-step verification, you will receive a text message to your phone with a code after you type your password to log in to your Google Drive. Simply enter this code and you will be allowed access to your Drive. Setting up a two-step verification is a simple process that is laid out for you when you establish a new password for your Google Drive, ...
... and it is one of the simplest ways to ensure security for your Drive.

Encryption

Encryption is a process that protects files from being accessed by unauthorized users, and this can be accomplished with any available apps that are designed to allow you to encrypt your data. Boxcryptor is one such application and it can encrypt the files on your Google Drive so that only you are able to access them. This encryption can be accomplished from your phone, PC or tablet. The security standards are equivalent to AES-256 and RSA-4096. Boxcryptor is available as a free or paid version, and the free version limits the number of accounts and features that you can employ.

Wireless Security

Many people are unaware that when you utilize your Google Drive account on an unsecured wireless network it can be easily accessed by hackers. This risk is not limited to your Google Drive account either. Online shopping or online banking can get you in to trouble if you access them on an unsecured wireless network. If you are utilizing your cell phone and you must conduct sensitive online activities, you may be better off to utilize a 4G connection through your cell phone carrier.

Beware of App Permissions

Most apps will require that you grant permissions to the app provider to obtain access to certain information on your social media accounts, and if they request permission for your Google Drive account, you may be unknowingly granting access to your private files. If these permissions are acceptable to you then proceed with caution, but be sure to review permissions for apps that you no longer use. To accomplish this easily, go to accounts.google.com and then click on the security tab. Under “Account Permissions”, you can click “View All” and see which apps have access to your files. Be sure to revoke access to any that you no longer use.

Sharing Risks

It can be quite convenient to share folders and files with family, friends or colleagues; however, overzealous sharing can result in compromised security. You should always make sure that you are sharing files only with people who you know and trust. You should remember also that you could share as “view only” meaning that nobody can alter your files.
One thing to watch out for is the sharing of parent or “root” files. If you do this, the user will have access to all files contained within that parent file. Simply make sure that you are only sharing specific folders or subfolders.

The Google Drive service is a great way to utilize a cloud-like storage system but you must approach this with caution in order to ensure that your data is secure. These simple steps will help to eliminate any potential breaches.

Author:
Tomas Cohen is a security enthusiast and analyst covering the most significant security topics and trends prevalent worldwide. He also involves in the technology related to Cloud Security, Data Loss Prevention, Google Drive Security etc.,

Total Views: 495Word Count: 668See All articles From Author

Add Comment

General Articles

1. Rules For Safe Driving In United States
Author: Patrica Crewe

2. Barebone Vs. Prebuilt Vs. Custom Pc: Which Is Right For You?
Author: adlerconway

3. Best Seo Company In Uk That Delivers Real Growth
Author: doaguru infosystems

4. Global Nanomedicine Market Enters A High-growth Phase Driven By Precision Drug Delivery
Author: siddhesh

5. What Is The Future Of The Pet Equipment Market? Growth Forecasts & Insights
Author: siddhesh

6. Global Dental Biomaterial Market Outlook Accelerates With Restorative And Bioactive Innovations
Author: siddhesh

7. Spiritual Tripindi Shradha Pooja And Rahu Ketu Pooja In Trimbakeshwar
Author: Pandit Ramkrishna Guruji

8. How Air Filters Contribute To Better Sleep Quality
Author: Jack Hoover

9. Where To Buy Poppers In The Uk: Your Complete Guide To Stores Vs. Online Shopping
Author: ukpopper

10. How Law Firm Seo Services Help Attract High-value Clients
Author: Attorneyrankings

11. Custom Power Apps Solutions For Automating Complex Business Processes
Author: david

12. Tractors: The New Era of Comfort To Farmers While Cultivating!
Author: khetigaadi

13. Top Non Voice Projects Provider | Zoetic Bpo Services
Author: mohan

14. Simple Guide For Pitra Dosh Puja And Kaal Sarp Dosh Puja In Trimbakeshwar
Author: Pandit Anuj Guruji

15. How Technology Adoption Challenges Affect Long-term Business Strategy
Author: david

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: