pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Google Drive Offers New Level of Protection

Protecting your data is an important topic these days. It seems every day when you turn the TV on you are hearing about some new data breach. And, these are only the major ones we are hearing about. There are thousands of people every day getting data stolen that we do not hear anything about. Then, when you introduce the cloud to the equation it makes for a more precarious situation. However, Google is doing something new to help protect the data that you store in their Google Drive program. It is called Security Keys and this article talks a bit more about them.

Google has been offering layers of protection for their applications from some time. The most common one is their two-step authentication which prompts you to enter a random code before getting access to your Google applications. This is a good level of protection that you should be using if you are using Google. But, Security Keys take things a step further with your Google Drive.

The Security is an actual USB device that plugs into your computer and sends out an encrypted key that verifies your identity to Google. You can get one for about $6 per device and there is no special software to install to make it work. You can even see where each key is used, and they can be disabled remotely should you lose one.

This device also makes the login process simpler. When you use the key on a particular device you can prompt for the computer to be remembered so you don’t have to use the device again on that computer if you choose that option. But, if your account is accessed from another device by a hacker, for example, they cannot get in unless they have your password and the physical key.

The Security Keys are not without their flaws, however. For one, you cannot use them on mobile devices like tablets and smart phones. And, they only work on your Google account when using the Chrome browser. If you access the service from another browser or from a mobile device, then you will need to continue using the two-step authentication.

The other drawback is that the Security Keys only work with Google Drive currently. You cannot use them with other Google applications like mail, voice, etc. Some users also have concerns about how much security it actually provides in the absence of a PIN number of fingerprint authentication. Their fear is that a stolen key could be used to access a drive before it is disabled.

The important thing to remember is it is another layer of protection. It is not perfect, but it adds a considerable amount of security to your account versus what a simple password can provide. A complex password combined with this device can create a major obstacle for someone who wishes to access your account and do harm.

Filed Under: Articles

Latest Articles

WLAN

WLAN Wireless LAN: a local area network that transmits over the air typically in an unlicensed frequency such as the 2.4GHz band. Wireless access points (base stations) are connected to an Ethernet hub or server and transmit a radio frequency over an area of several hundred to a … [Read More...]

FusionPlayer

The whole premise of FusionPlayer is that it will let you create media play lists using videos on the computer and videos from the Internet. That is its hook and the incentive to install the program. The truth is, however, this is a PUP (potentially unwanted program)that is nothing more than a … [Read More...]

Free Online Data Backup Options

We all know we need to backup our important data.  All too often we get lazy and the next thing you know the photos and files from the past 5 years have been destroyed.  Hard drives are mechanical and have a life span.  Eveyr hard drive in the world will eventually fail.  Some are rated to work for … [Read More...]

Streamline Startup Operations with Virtual Data Rooms

Modern startup projects that we see in the business cluster today are more than just a brilliant idea of a potentially successful project at the … [Read More...]

The Importance of Data Security in Retail IoT

The Internet of Things (IoT) is transforming the retail industry by connecting physical stores with digital platforms, enabling smart inventory … [Read More...]

Review of Temu From Purchaser and Affiliate

Temu is a relatively new online shopping platform that has quickly gained popularity, especially among Gen Z shoppers. It is known for its ultra-cheap … [Read More...]

Avoid Data Breaches Caused by Weak Passwords

Weak passwords are a common cause of data breaches and security vulnerabilities. Weak passwords make it easier for cybercriminals to gain unauthorized … [Read More...]

20 Cool Pictures of Silicon Valley You’re Sure to Love

Silicon Valley, a name synonymous with innovation and technological prowess, is a place where dreams and ideas come to life. Nestled in the heart of … [Read More...]

13 Funky Images of Laptops

In our digital age, laptops have become our faithful companions, indispensable tools for work, leisure, and everything in between. They've evolved … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Inbox Zero with Streak

Email is perhaps the most important communication medium we use in business. It can be used to keep tasks going, document tasks and procedures and … [Read More...]

Protect Your Business with Online Reputation Management

As a company grows the potential for negative comments online become more common. This type of activity needs to be monitored for potential issues.  … [Read More...]

Apple’s first computer is for sale on eBay and here’s its price

Apple recently made one of its biggest announcements since the unfortunate passing of Steve Jobs. The company is about to sell its first computer ever … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors