SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
5 STEPS TO SECURE GOOGLE DRIVE
BACKUPIFY – AUGUST 2012
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 2
INTRODUCTION
Introduced a few months ago, Google Drive is more than just an online place to
stash files. Google Drive is integrated into many Google applications including
Google Apps and lets you access your information from just about anywhere –
including mobile devices. But what kind of risks do you face by uploading your
data to the cloud? We address Google Drive-specific security issues below.
TIP #1: USE TWO-STEP VERIFICATION
The biggest risk to your data is your credentials, which for most of us is an easily
guessed password. Two-step verification is one of the surest ways to secure your
Google Account (which gives you access to Google Drive, of course). Once enabled
you’ll have to enter not only your password but a second code Google sends to
your mobile phone via text message. It doesn’t add much time to the login
process and is infinitely more secure. Why? If someone tries to hack your account
they’ll need your password AND your phone.
Google’s short DIY on how to setup two-step verification can be found here.
TIP #2: SETUP RECOVERY ON YOUR GOOGLE ACCOUNT
It can happen – let’s say you lost control of your account to a third party (you left
your account logged into on a public computer, forgot to lock your computer,
someone guessed your password). Google Drive users should be more concerned
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 3
than anyone, especially if they’re uploading identity-theft grade files like tax
returns or insurance documents.
Fortunately, losing control of your account isn’t the end of the world. You can
setup account recovery options which will allow you to regain control of your
Google Account. Things you can do include adding a security question, use of
your mobile phone, and most importantly, setting up an alternate email address.
TIP #3: SECURE YOUR FILES BY APPLICATION
Think of Google Drive as a backend platform – while it can simply store files, it’s
also designed to act as a storage subsystem for applications (Google Apps, for
example, now uses Google Drive instead of the defunct Google Documents). You
can find apps that store photos, videos and even faxes in Google Drive in
the Chrome Web Store. Why is it important to think about security on a per-file
basis? You may not want to give a video editing app access to last year’s W2 form.
While it probably won’t hurt, keep in mind that most apps for Google Drive are
not developed by Google (read: third-party). It’s not that we don’t trust anyone,
but why take any risk, no matter how small, if it’s unnecessary?
Chances are you won’t be micromanaging access to all of your files (especially if
you have thousands like I do) – maybe just to that W2 like I mentioned. To revoke
an app’s permission to a file, right-click the file and click “View authorized apps…”
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 4
and then the Revoke button next to any app you don’t want to have access. You
will still have access to the file through Google Drive, but the app won’t.
TIP #4: CONTROL ENTIRE APPS WITH ONE CLICK
Do you want to cut off an app’s access to your data entirely? This would be a
good idea if you’re not using the App – and chances are you’ve downloaded one
too many that is not being used.
Go to accounts.google.com, sign in, and click “Security” on the left. Then click on
“Authorizing applications & sites”:
This page shows you every app that has access to your data and gives you one
button to revoke all access. Neat!
TIP #5: BACKUP GOOGLE DRIVE
No matter how much you protect your Google Drive data from outside attacks, it’s
hard to protect it from yourself. Nearly 63% of all data loss in Google Apps is user
error – cases of accidental deletion tops among them. Moreover, if you’ve shared a
Google Drive item with another user, they could corrupt or delete those
documents through no fault of your own. The best defense against user error (and
any other form of data loss) is an independent backup of Google Drive.
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 5
CONCLUSION
It’s important to be stringent about access to your data. Think about access to
your Google Account for starters; make sure you setup two-step verification and
your account recovery options. Two-step verification is an extra barrier to hacking
and recovery means you can regain control of your account should anyone
actually get in. Next we have the issue of third-party apps having access to your
data in Google Drive. You can setup access on a per-file basis and even lock out
entire applications with a few clicks. Lastly, backup of all data is best practice, even
in Google Drive. Remember that Google is doing a lot of unsaid work behind the
scenes to keep your data safe, but at the end of the day you’re ultimately
responsible for what you upload to the Internet and how you protect it.
Hope you’ve got a good backup plan.
ABOUT BACKUPIFY
Backupify is the leading provider of backup and restore solutions for SaaS
applications including Google Apps, Salesforce, Facebook, Twitter, and more.
Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over
200,000 users trusting us with more than 500 million documents, two billion email
messages and 350 terabytes of data.
WHY BACKUP CLOUD DATA?
Your data is one of the most critical assets of your business. Like any important
asset, it should be insured. While most SaaS providers, including Google and
Salesforce, offer state-of-the-art disaster recovery capabilities that protect you
from some forms of data loss, you are still at risk for data loss due to user error,
hacked accounts and third-party application bugs. To fully replicate your on-
premise backup capabilities in the cloud, you need the ability to perform granular
restores, and to retain the control that comes from having your own secure
second copy of the data in your SaaS applications.
5 STEPS TO SECURE GOOGLE DRIVE
Backupify, Inc. 6
FIND OUT MORE
If you're interested in the peace of mind you get from an automated Google Apps
or Salesforce backup solution, feel free to contact us directly at
info@backupify.com.
 Web http://www.backupify.com
 Phone 1.800.571.4984
 Twitter http://twitter.com/backupify
Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names
may be the trademarks or registered trademarks of their respective owners.
© 2012 Backupify, Inc. Item: GAT-WP-EN-200110608

Weitere ähnliche Inhalte

Andere mochten auch

Corruption Perceptions Index 2011
Corruption Perceptions Index 2011Corruption Perceptions Index 2011
Corruption Perceptions Index 2011Tawanda Kanhema
 
Eresources three things training august 2014
Eresources three things training august 2014Eresources three things training august 2014
Eresources three things training august 2014pdrreid
 
Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP CSP Scarl
 
Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010Tawanda Kanhema
 
Research proposal m macri
Research proposal m macriResearch proposal m macri
Research proposal m macrimacrim5
 
Scuola futuro prossimo
Scuola futuro prossimoScuola futuro prossimo
Scuola futuro prossimoCSP Scarl
 
Handout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapsoHandout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapsoU.E.N. Libertador
 
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...CSP Scarl
 
I4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazzaI4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazzaCSP Scarl
 
Csp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molinoCsp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molinoCSP Scarl
 
Wilson Altruism
Wilson AltruismWilson Altruism
Wilson Altruismclover66
 
Retirement Income by KJH Financial Services
Retirement Income by KJH Financial ServicesRetirement Income by KJH Financial Services
Retirement Income by KJH Financial ServicesKimberly Howard, CFP
 

Andere mochten auch (20)

Corruption Perceptions Index 2011
Corruption Perceptions Index 2011Corruption Perceptions Index 2011
Corruption Perceptions Index 2011
 
Eresources three things training august 2014
Eresources three things training august 2014Eresources three things training august 2014
Eresources three things training august 2014
 
Shonkoff
ShonkoffShonkoff
Shonkoff
 
Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP Il catalogo 2010 Asset CSP
Il catalogo 2010 Asset CSP
 
Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010Conflicting Interests: World Cup 2010
Conflicting Interests: World Cup 2010
 
Autorretratos
AutorretratosAutorretratos
Autorretratos
 
21019056
2101905621019056
21019056
 
Research proposal m macri
Research proposal m macriResearch proposal m macri
Research proposal m macri
 
Biznes "World Class"
Biznes "World Class"Biznes "World Class"
Biznes "World Class"
 
Profile your ideal workplace
Profile your ideal workplaceProfile your ideal workplace
Profile your ideal workplace
 
Scuola futuro prossimo
Scuola futuro prossimoScuola futuro prossimo
Scuola futuro prossimo
 
Handout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapsoHandout 3 er año libertador 3er lapso
Handout 3 er año libertador 3er lapso
 
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
La sperimentazione White Spaces in Piemonte Caratteristiche e prestazione del...
 
I4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazzaI4 school qrpark_promoey_piazza
I4 school qrpark_promoey_piazza
 
Henry matisse
Henry matisseHenry matisse
Henry matisse
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Csp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molinoCsp@scuola2011 seminariointro molino
Csp@scuola2011 seminariointro molino
 
Wilson Altruism
Wilson AltruismWilson Altruism
Wilson Altruism
 
Kennedy Creek Poll Dorsets - sires used for 2013
Kennedy Creek Poll Dorsets - sires used for 2013Kennedy Creek Poll Dorsets - sires used for 2013
Kennedy Creek Poll Dorsets - sires used for 2013
 
Retirement Income by KJH Financial Services
Retirement Income by KJH Financial ServicesRetirement Income by KJH Financial Services
Retirement Income by KJH Financial Services
 

Ähnlich wie 5 Steps to Secure Google Drive

Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site AdministratorsBackupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site AdministratorsMabelmcCain01
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google AppsElastica Inc.
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedKim Jensen
 
3-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 3653-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 365Abhishek Sood
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionscharly simon
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersFIDO Alliance
 
The Google Hack VSeries.pdf
The Google Hack VSeries.pdfThe Google Hack VSeries.pdf
The Google Hack VSeries.pdfOsama Khalil
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113Tasha Schaa
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecureMedia Sonar
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure ApplicationsHelpSystems
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)Mohit Sharma
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)Hiz Farhan
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationJSPM's JSCOE , Pune Maharashtra.
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockCloudLock
 

Ähnlich wie 5 Steps to Secure Google Drive (20)

Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site AdministratorsBackupify versus Spanning: Offering Ideal Options for IT Site Administrators
Backupify versus Spanning: Offering Ideal Options for IT Site Administrators
 
Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1Google Apps in Legal Aid - Part 1
Google Apps in Legal Aid - Part 1
 
Protecting your Data in Google Apps
Protecting your Data in Google AppsProtecting your Data in Google Apps
Protecting your Data in Google Apps
 
Infoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updatedInfoworld deep dive - Mobile Security2015 updated
Infoworld deep dive - Mobile Security2015 updated
 
3-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 3653-Step Guide To Protecting Data In Office 365
3-Step Guide To Protecting Data In Office 365
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
 
Google Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and ConsumersGoogle Case Study: Strong Authentication for Employees and Consumers
Google Case Study: Strong Authentication for Employees and Consumers
 
The Google Hack VSeries.pdf
The Google Hack VSeries.pdfThe Google Hack VSeries.pdf
The Google Hack VSeries.pdf
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Cloud storage imd113
Cloud storage imd113Cloud storage imd113
Cloud storage imd113
 
5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure5 Ways to Stay #CyberSecure
5 Ways to Stay #CyberSecure
 
13 Tips to Write Secure Applications
13 Tips to Write Secure Applications13 Tips to Write Secure Applications
13 Tips to Write Secure Applications
 
google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)google-apps-security-and-compliance-whitepaper (1)
google-apps-security-and-compliance-whitepaper (1)
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)assignment IMD113 (cloud storage)
assignment IMD113 (cloud storage)
 
Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
 
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User RevocationIntegrity Auditing Of Dynamic Cloud Data With Group User Revocation
Integrity Auditing Of Dynamic Cloud Data With Group User Revocation
 
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLockBe A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
Be A Hero: Combat Cloud Security Threats with Google Apps Unlimited & CloudLock
 

Mehr von Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data ProtectionDatto
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your SchoolDatto
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. PublicDatto
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessDatto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?Datto
 

Mehr von Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 
Do You Have Protection?
Do You Have Protection?Do You Have Protection?
Do You Have Protection?
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 

5 Steps to Secure Google Drive

  • 1. 5 STEPS TO SECURE GOOGLE DRIVE BACKUPIFY – AUGUST 2012
  • 2. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 2 INTRODUCTION Introduced a few months ago, Google Drive is more than just an online place to stash files. Google Drive is integrated into many Google applications including Google Apps and lets you access your information from just about anywhere – including mobile devices. But what kind of risks do you face by uploading your data to the cloud? We address Google Drive-specific security issues below. TIP #1: USE TWO-STEP VERIFICATION The biggest risk to your data is your credentials, which for most of us is an easily guessed password. Two-step verification is one of the surest ways to secure your Google Account (which gives you access to Google Drive, of course). Once enabled you’ll have to enter not only your password but a second code Google sends to your mobile phone via text message. It doesn’t add much time to the login process and is infinitely more secure. Why? If someone tries to hack your account they’ll need your password AND your phone. Google’s short DIY on how to setup two-step verification can be found here. TIP #2: SETUP RECOVERY ON YOUR GOOGLE ACCOUNT It can happen – let’s say you lost control of your account to a third party (you left your account logged into on a public computer, forgot to lock your computer, someone guessed your password). Google Drive users should be more concerned
  • 3. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 3 than anyone, especially if they’re uploading identity-theft grade files like tax returns or insurance documents. Fortunately, losing control of your account isn’t the end of the world. You can setup account recovery options which will allow you to regain control of your Google Account. Things you can do include adding a security question, use of your mobile phone, and most importantly, setting up an alternate email address. TIP #3: SECURE YOUR FILES BY APPLICATION Think of Google Drive as a backend platform – while it can simply store files, it’s also designed to act as a storage subsystem for applications (Google Apps, for example, now uses Google Drive instead of the defunct Google Documents). You can find apps that store photos, videos and even faxes in Google Drive in the Chrome Web Store. Why is it important to think about security on a per-file basis? You may not want to give a video editing app access to last year’s W2 form. While it probably won’t hurt, keep in mind that most apps for Google Drive are not developed by Google (read: third-party). It’s not that we don’t trust anyone, but why take any risk, no matter how small, if it’s unnecessary? Chances are you won’t be micromanaging access to all of your files (especially if you have thousands like I do) – maybe just to that W2 like I mentioned. To revoke an app’s permission to a file, right-click the file and click “View authorized apps…”
  • 4. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 4 and then the Revoke button next to any app you don’t want to have access. You will still have access to the file through Google Drive, but the app won’t. TIP #4: CONTROL ENTIRE APPS WITH ONE CLICK Do you want to cut off an app’s access to your data entirely? This would be a good idea if you’re not using the App – and chances are you’ve downloaded one too many that is not being used. Go to accounts.google.com, sign in, and click “Security” on the left. Then click on “Authorizing applications & sites”: This page shows you every app that has access to your data and gives you one button to revoke all access. Neat! TIP #5: BACKUP GOOGLE DRIVE No matter how much you protect your Google Drive data from outside attacks, it’s hard to protect it from yourself. Nearly 63% of all data loss in Google Apps is user error – cases of accidental deletion tops among them. Moreover, if you’ve shared a Google Drive item with another user, they could corrupt or delete those documents through no fault of your own. The best defense against user error (and any other form of data loss) is an independent backup of Google Drive.
  • 5. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 5 CONCLUSION It’s important to be stringent about access to your data. Think about access to your Google Account for starters; make sure you setup two-step verification and your account recovery options. Two-step verification is an extra barrier to hacking and recovery means you can regain control of your account should anyone actually get in. Next we have the issue of third-party apps having access to your data in Google Drive. You can setup access on a per-file basis and even lock out entire applications with a few clicks. Lastly, backup of all data is best practice, even in Google Drive. Remember that Google is doing a lot of unsaid work behind the scenes to keep your data safe, but at the end of the day you’re ultimately responsible for what you upload to the Internet and how you protect it. Hope you’ve got a good backup plan. ABOUT BACKUPIFY Backupify is the leading provider of backup and restore solutions for SaaS applications including Google Apps, Salesforce, Facebook, Twitter, and more. Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over 200,000 users trusting us with more than 500 million documents, two billion email messages and 350 terabytes of data. WHY BACKUP CLOUD DATA? Your data is one of the most critical assets of your business. Like any important asset, it should be insured. While most SaaS providers, including Google and Salesforce, offer state-of-the-art disaster recovery capabilities that protect you from some forms of data loss, you are still at risk for data loss due to user error, hacked accounts and third-party application bugs. To fully replicate your on- premise backup capabilities in the cloud, you need the ability to perform granular restores, and to retain the control that comes from having your own secure second copy of the data in your SaaS applications.
  • 6. 5 STEPS TO SECURE GOOGLE DRIVE Backupify, Inc. 6 FIND OUT MORE If you're interested in the peace of mind you get from an automated Google Apps or Salesforce backup solution, feel free to contact us directly at info@backupify.com.  Web http://www.backupify.com  Phone 1.800.571.4984  Twitter http://twitter.com/backupify Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names may be the trademarks or registered trademarks of their respective owners. © 2012 Backupify, Inc. Item: GAT-WP-EN-200110608