pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Google Drive Offers New Level of Protection

Protecting your data is an important topic these days. It seems every day when you turn the TV on you are hearing about some new data breach. And, these are only the major ones we are hearing about. There are thousands of people every day getting data stolen that we do not hear anything about. Then, when you introduce the cloud to the equation it makes for a more precarious situation. However, Google is doing something new to help protect the data that you store in their Google Drive program. It is called Security Keys and this article talks a bit more about them.

Google has been offering layers of protection for their applications from some time. The most common one is their two-step authentication which prompts you to enter a random code before getting access to your Google applications. This is a good level of protection that you should be using if you are using Google. But, Security Keys take things a step further with your Google Drive.

The Security is an actual USB device that plugs into your computer and sends out an encrypted key that verifies your identity to Google. You can get one for about $6 per device and there is no special software to install to make it work. You can even see where each key is used, and they can be disabled remotely should you lose one.

This device also makes the login process simpler. When you use the key on a particular device you can prompt for the computer to be remembered so you don’t have to use the device again on that computer if you choose that option. But, if your account is accessed from another device by a hacker, for example, they cannot get in unless they have your password and the physical key.

The Security Keys are not without their flaws, however. For one, you cannot use them on mobile devices like tablets and smart phones. And, they only work on your Google account when using the Chrome browser. If you access the service from another browser or from a mobile device, then you will need to continue using the two-step authentication.

The other drawback is that the Security Keys only work with Google Drive currently. You cannot use them with other Google applications like mail, voice, etc. Some users also have concerns about how much security it actually provides in the absence of a PIN number of fingerprint authentication. Their fear is that a stolen key could be used to access a drive before it is disabled.

The important thing to remember is it is another layer of protection. It is not perfect, but it adds a considerable amount of security to your account versus what a simple password can provide. A complex password combined with this device can create a major obstacle for someone who wishes to access your account and do harm.

Filed Under: Articles

Latest Articles

Bios Configuration

Whichever method you've used to update your BIOS, it's important that the new BIOS Setup defaults are used when the system is next powered on. You can do this by entering Setup by pressing the appropriate key - generally DEL as soon as POST starts and by then selecting the option to Load BIOS Setup … [Read More...]

Increase tablet productivity

Making Your Tablet More Productive

Tablets like the iPad and Android devices have become more commonplace. In fact, more businesses are using them in new and innovative ways. Tablets are very flexible in the ways they are used and can be customized to fit many different business uses. However, tablets do have a reputation of being … [Read More...]

Hard Disk (Hard Drive) Performance – transfer rates, latency and seek times

The performance of a hard disk is very important to the overall speed of the system - a slow hard disk having the potential to hinder a fast processor like no other system component - and the effective speed of a hard disk is determined by a number of factors. Chief among them is the rotational … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

LCD Resolution and Scaling

LCDs follow a different set of rules than CRT displays offering advantages in terms of bulk, power consumption and flicker, as well as … [Read More...]

Evolution of the motherboard

The original PC motherboard had a minimum of integrated devices, just ports for a keyboard and a cassette deck (for storage). Everything else, … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors