pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Google Drive Offers New Level of Protection

Protecting your data is an important topic these days. It seems every day when you turn the TV on you are hearing about some new data breach. And, these are only the major ones we are hearing about. There are thousands of people every day getting data stolen that we do not hear anything about. Then, when you introduce the cloud to the equation it makes for a more precarious situation. However, Google is doing something new to help protect the data that you store in their Google Drive program. It is called Security Keys and this article talks a bit more about them.

Google has been offering layers of protection for their applications from some time. The most common one is their two-step authentication which prompts you to enter a random code before getting access to your Google applications. This is a good level of protection that you should be using if you are using Google. But, Security Keys take things a step further with your Google Drive.

The Security is an actual USB device that plugs into your computer and sends out an encrypted key that verifies your identity to Google. You can get one for about $6 per device and there is no special software to install to make it work. You can even see where each key is used, and they can be disabled remotely should you lose one.

This device also makes the login process simpler. When you use the key on a particular device you can prompt for the computer to be remembered so you don’t have to use the device again on that computer if you choose that option. But, if your account is accessed from another device by a hacker, for example, they cannot get in unless they have your password and the physical key.

The Security Keys are not without their flaws, however. For one, you cannot use them on mobile devices like tablets and smart phones. And, they only work on your Google account when using the Chrome browser. If you access the service from another browser or from a mobile device, then you will need to continue using the two-step authentication.

The other drawback is that the Security Keys only work with Google Drive currently. You cannot use them with other Google applications like mail, voice, etc. Some users also have concerns about how much security it actually provides in the absence of a PIN number of fingerprint authentication. Their fear is that a stolen key could be used to access a drive before it is disabled.

The important thing to remember is it is another layer of protection. It is not perfect, but it adds a considerable amount of security to your account versus what a simple password can provide. A complex password combined with this device can create a major obstacle for someone who wishes to access your account and do harm.

Filed Under: Articles

Latest Articles

Modulation

Communication channels like telephone lines are usually analogue media. Analogue media is a bandwidth limited channel. In the case of telephone lines the usable bandwidth frequencies is in the range of 300 Hz to 3300 Hz. Data communication … [Read More...]

Android’s Quick Draining Apps – What To Do

Android devices are like our best friends. With endless gaming and networking,  your phone or tablet can really make your life easier. However, there are times that  as we use our gadgets we notice that they tend to become slower and the batteries drain faster. And if your device is new, you may … [Read More...]

Tips to Protect your Snapchat Account from a Data Breach

Ephemeral messaging is all the rage. But it carries certain risks. The popular messaging app Snapchat, which has more than 100 million followers worldwide, has a problem that can cause confusion among its users. According to experts at security firm Kaspersky Lab, many Snapchat users are unaware … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

10 Exceptional Books on ChatGPT that Will Blow Your Mind

ChatGPT is a powerful new AI tool that is taking the world by storm. You are going to find a lot of amazing books that will teach you how to make the … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Background Principles to Creating a Good Digital Music Management System

Background Principles The following aims and requirements are met by this DMMS. They are in no particular order of priority or preference. A … [Read More...]

Blu-Ray – the Hi-Def Blue Laser Disk Technology

Optical disks have come a long way. They began back in the 1980s with the humble CD, which was great for music, computer software and data. … [Read More...]

Protect Yourself on the Web With These Three Simple Steps

Most people understand that the passwords to their computers and networks need to be more difficult to guess or crack. All of our computers and … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors