SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
5 STEPS TO SECURE GOOGLE DRIVE
BACKUPIFY – AUGUST 2012
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 2
INTRODUCTION
Introduced a few months ago, Google Drive is more than just an online place to
stash files. Google Drive is integrated into many Google applications including
Google Apps and lets you access your information from just about anywhere –
including mobile devices. But what kind of risks do you face by uploading your
data to the cloud? We address Google Drive-specific security issues below.
TIP #1: USE TWO-STEP VERIFICATION
The biggest risk to your data is your credentials, which for most of us is an easily
guessed password. Two-step verification is one of the surest ways to secure your
Google Account (which gives you access to Google Drive, of course). Once enabled
you’ll have to enter not only your password but a second code Google sends to
your mobile phone via text message. It doesn’t add much time to the login
process and is infinitely more secure. Why? If someone tries to hack your account
they’ll need your password AND your phone.
Google’s short DIY on how to setup two-step verification can be found here.
TIP #2: SETUP RECOVERY ON YOUR GOOGLE ACCOUNT
It can happen – let’s say you lost control of your account to a third party (you left
your account logged into on a public computer, forgot to lock your computer,
someone guessed your password). Google Drive users should be more concerned
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 3
than anyone, especially if they’re uploading identity-theft grade files like tax
returns or insurance documents.
Fortunately, losing control of your account isn’t the end of the world. You can
setup account recovery options which will allow you to regain control of your
Google Account. Things you can do include adding a security question, use of
your mobile phone, and most importantly, setting up an alternate email address.
TIP #3: SECURE YOUR FILES BY APPLICATION
Think of Google Drive as a backend platform – while it can simply store files, it’s
also designed to act as a storage subsystem for applications (Google Apps, for
example, now uses Google Drive instead of the defunct Google Documents). You
can find apps that store photos, videos and even faxes in Google Drive in
the Chrome Web Store. Why is it important to think about security on a per-file
basis? You may not want to give a video editing app access to last year’s W2 form.
While it probably won’t hurt, keep in mind that most apps for Google Drive are
not developed by Google (read: third-party). It’s not that we don’t trust anyone,
but why take any risk, no matter how small, if it’s unnecessary?
Chances are you won’t be micromanaging access to all of your files (especially if
you have thousands like I do) – maybe just to that W2 like I mentioned. To revoke
an app’s permission to a file, right-click the file and click “View authorized apps…”
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 4
and then the Revoke button next to any app you don’t want to have access. You
will still have access to the file through Google Drive, but the app won’t.
TIP #4: CONTROL ENTIRE APPS WITH ONE CLICK
Do you want to cut off an app’s access to your data entirely? This would be a
good idea if you’re not using the App – and chances are you’ve downloaded one
too many that is not being used.
Go to accounts.google.com, sign in, and click “Security” on the left. Then click on
“Authorizing applications & sites”:
This page shows you every app that has access to your data and gives you one
button to revoke all access. Neat!
TIP #5: BACKUP GOOGLE DRIVE
No matter how much you protect your Google Drive data from outside attacks, it’s
hard to protect it from yourself. Nearly 63% of all data loss in Google Apps is user
error – cases of accidental deletion tops among them. Moreover, if you’ve shared a
Google Drive item with another user, they could corrupt or delete those
documents through no fault of your own. The best defense against user error (and
any other form of data loss) is an independent backup of Google Drive.
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 5
CONCLUSION
It’s important to be stringent about access to your data. Think about access to
your Google Account for starters; make sure you setup two-step verification and
your account recovery options. Two-step verification is an extra barrier to hacking
and recovery means you can regain control of your account should anyone
actually get in. Next we have the issue of third-party apps having access to your
data in Google Drive. You can setup access on a per-file basis and even lock out
entire applications with a few clicks. Lastly, backup of all data is best practice, even
in Google Drive. Remember that Google is doing a lot of unsaid work behind the
scenes to keep your data safe, but at the end of the day you’re ultimately
responsible for what you upload to the Internet and how you protect it.
Hope you’ve got a good backup plan.
ABOUT BACKUPIFY
Backupify is the leading provider of backup and restore solutions for SaaS
applications including Google Apps, Salesforce, Facebook, Twitter, and more.
Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over
200,000 users trusting us with more than 500 million documents, two billion email
messages and 350 terabytes of data.
WHY BACKUP CLOUD DATA?
Your data is one of the most critical assets of your business. Like any important
asset, it should be insured. While most SaaS providers, including Google and
Salesforce, offer state-of-the-art disaster recovery capabilities that protect you
from some forms of data loss, you are still at risk for data loss due to user error,
hacked accounts and third-party application bugs. To fully replicate your on-
premise backup capabilities in the cloud, you need the ability to perform granular
restores, and to retain the control that comes from having your own secure
second copy of the data in your SaaS applications.
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 6
FIND OUT MORE
If you're interested in the peace of mind you get from an automated Google Apps
or Salesforce backup solution, feel free to contact us directly at
info@backupify.com.
 Web http://www.backupify.com
 Phone 1.800.571.4984
 Twitter http://twitter.com/backupify
Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names
may be the trademarks or registered trademarks of their respective owners.
© 2012 Backupify, Inc. Item: GAT-WP-EN-200110608

Mais conteúdo relacionado

Destaque

Research proposal m macri
Research proposal m macriResearch proposal m macri
Research proposal m macri
macrim5
 
Handout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapsoHandout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapso
U.E.N. Libertador
 
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
CSP Scarl
 
I4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazzaI4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazza
CSP Scarl
 
Wilson Altruism
Wilson AltruismWilson Altruism
Wilson Altruism
clover66
 

Destaque (20)

Corruption Perceptions Index 2011
Corruption Perceptions Index 2011Corruption Perceptions Index 2011
Corruption Perceptions Index 2011
 
Eresources three things training august 2014
Eresources three things training august 2014Eresources three things training august 2014
Eresources three things training august 2014
 
Shonkoff
ShonkoffShonkoff
Shonkoff
 
Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP
 
Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010
 
Autorretratos
AutorretratosAutorretratos
Autorretratos
 
21019056
2101905621019056
21019056
 
Research proposal m macri
Research proposal m macriResearch proposal m macri
Research proposal m macri
 
Biznes "World Class"
Biznes "World Class"Biznes "World Class"
Biznes "World Class"
 
Profile your ideal workplace
Profile your ideal workplaceProfile your ideal workplace
Profile your ideal workplace
 
Scuola futuro prossimo
Scuola futuro prossimoScuola futuro prossimo
Scuola futuro prossimo
 
Handout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapsoHandout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapso
 
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
 
I4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazzaI4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazza
 
Henry matisse
Henry matisseHenry matisse
Henry matisse
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Csp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molinoCsp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molino
 
Wilson Altruism
Wilson AltruismWilson Altruism
Wilson Altruism
 
Kennedy Creek Poll Dorsets - sires used for 2013
Kennedy Creek Poll Dorsets - sires used for 2013Kennedy Creek Poll Dorsets - sires used for 2013
Kennedy Creek Poll Dorsets - sires used for 2013
 
Retirement Income by KJH Financial Services
Retirement Income by KJH Financial ServicesRetirement Income by KJH Financial Services
Retirement Income by KJH Financial Services
 

Semelhante a 5 Steps to Secure Google Drive

Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site AdministratorsBackupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
MabelmcCain01
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113
Tasha Schaa
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure Applications
HelpSystems
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)
Mohit Sharma
 
assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)
Hiz Farhan
 

Semelhante a 5 Steps to Secure Google Drive (20)

Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site AdministratorsBackupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
 
Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
3-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 3653-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 365
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
The Google Hack VSeries.pdf
The Google Hack VSeries.pdfThe Google Hack VSeries.pdf
The Google Hack VSeries.pdf
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure Applications
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)
 
Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 

Mais de Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

Mais de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

5 Steps to Secure Google Drive

  • 1. 5 STEPS TO SECURE GOOGLE DRIVE BACKUPIFY – AUGUST 2012
  • 2. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 2 INTRODUCTION Introduced a few months ago, Google Drive is more than just an online place to stash files. Google Drive is integrated into many Google applications including Google Apps and lets you access your information from just about anywhere – including mobile devices. But what kind of risks do you face by uploading your data to the cloud? We address Google Drive-specific security issues below. TIP #1: USE TWO-STEP VERIFICATION The biggest risk to your data is your credentials, which for most of us is an easily guessed password. Two-step verification is one of the surest ways to secure your Google Account (which gives you access to Google Drive, of course). Once enabled you’ll have to enter not only your password but a second code Google sends to your mobile phone via text message. It doesn’t add much time to the login process and is infinitely more secure. Why? If someone tries to hack your account they’ll need your password AND your phone. Google’s short DIY on how to setup two-step verification can be found here. TIP #2: SETUP RECOVERY ON YOUR GOOGLE ACCOUNT It can happen – let’s say you lost control of your account to a third party (you left your account logged into on a public computer, forgot to lock your computer, someone guessed your password). Google Drive users should be more concerned
  • 3. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 3 than anyone, especially if they’re uploading identity-theft grade files like tax returns or insurance documents. Fortunately, losing control of your account isn’t the end of the world. You can setup account recovery options which will allow you to regain control of your Google Account. Things you can do include adding a security question, use of your mobile phone, and most importantly, setting up an alternate email address. TIP #3: SECURE YOUR FILES BY APPLICATION Think of Google Drive as a backend platform – while it can simply store files, it’s also designed to act as a storage subsystem for applications (Google Apps, for example, now uses Google Drive instead of the defunct Google Documents). You can find apps that store photos, videos and even faxes in Google Drive in the Chrome Web Store. Why is it important to think about security on a per-file basis? You may not want to give a video editing app access to last year’s W2 form. While it probably won’t hurt, keep in mind that most apps for Google Drive are not developed by Google (read: third-party). It’s not that we don’t trust anyone, but why take any risk, no matter how small, if it’s unnecessary? Chances are you won’t be micromanaging access to all of your files (especially if you have thousands like I do) – maybe just to that W2 like I mentioned. To revoke an app’s permission to a file, right-click the file and click “View authorized apps…”
  • 4. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 4 and then the Revoke button next to any app you don’t want to have access. You will still have access to the file through Google Drive, but the app won’t. TIP #4: CONTROL ENTIRE APPS WITH ONE CLICK Do you want to cut off an app’s access to your data entirely? This would be a good idea if you’re not using the App – and chances are you’ve downloaded one too many that is not being used. Go to accounts.google.com, sign in, and click “Security” on the left. Then click on “Authorizing applications & sites”: This page shows you every app that has access to your data and gives you one button to revoke all access. Neat! TIP #5: BACKUP GOOGLE DRIVE No matter how much you protect your Google Drive data from outside attacks, it’s hard to protect it from yourself. Nearly 63% of all data loss in Google Apps is user error – cases of accidental deletion tops among them. Moreover, if you’ve shared a Google Drive item with another user, they could corrupt or delete those documents through no fault of your own. The best defense against user error (and any other form of data loss) is an independent backup of Google Drive.
  • 5. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 5 CONCLUSION It’s important to be stringent about access to your data. Think about access to your Google Account for starters; make sure you setup two-step verification and your account recovery options. Two-step verification is an extra barrier to hacking and recovery means you can regain control of your account should anyone actually get in. Next we have the issue of third-party apps having access to your data in Google Drive. You can setup access on a per-file basis and even lock out entire applications with a few clicks. Lastly, backup of all data is best practice, even in Google Drive. Remember that Google is doing a lot of unsaid work behind the scenes to keep your data safe, but at the end of the day you’re ultimately responsible for what you upload to the Internet and how you protect it. Hope you’ve got a good backup plan. ABOUT BACKUPIFY Backupify is the leading provider of backup and restore solutions for SaaS applications including Google Apps, Salesforce, Facebook, Twitter, and more. Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over 200,000 users trusting us with more than 500 million documents, two billion email messages and 350 terabytes of data. WHY BACKUP CLOUD DATA? Your data is one of the most critical assets of your business. Like any important asset, it should be insured. While most SaaS providers, including Google and Salesforce, offer state-of-the-art disaster recovery capabilities that protect you from some forms of data loss, you are still at risk for data loss due to user error, hacked accounts and third-party application bugs. To fully replicate your on- premise backup capabilities in the cloud, you need the ability to perform granular restores, and to retain the control that comes from having your own secure second copy of the data in your SaaS applications.
  • 6. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 6 FIND OUT MORE If you're interested in the peace of mind you get from an automated Google Apps or Salesforce backup solution, feel free to contact us directly at info@backupify.com.  Web http://www.backupify.com  Phone 1.800.571.4984  Twitter http://twitter.com/backupify Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names may be the trademarks or registered trademarks of their respective owners. © 2012 Backupify, Inc. Item: GAT-WP-EN-200110608