Friday, May 5, 2017

11 Google File Sharing Facts That Are a Risk To Your Privacy

Just about everyone knows about Google’s file sharing options. Google Drive, Google Docs, and Gmail have become mainstays of the industry with millions of users across their sharing apps, and for a good reason. Google’s offerings are simple-to-use, reliable, and make getting your files to recipients for instant collaboration a breeze.

google file sharing privacy risks

There may be a darker side to all this Google-related cheer, though. Google’s file sharing comes with its share of privacy concerns, and despite Google’s insistence that your information is stored in their “secure data centers” there’s no shortage of articles about the company leaking information or allegedly mining and marketing data to third parties to make a buck.

Here are some facts that might make you think twice about your privacy when making use of Google’s various platforms.

1) Google Has Some Sordid History with Their File Sharing

We mentioned one lawsuit Google found itself mired in at the onset, but that isn’t the first, last, or only time Google has found themselves in hot water. Look at Matera vs. Google if you’d like. Though they dodged any serious repercussions with a settlement, the fact that instances like this keep popping up doesn’t bode well for the company’s image.

In particular, it gives the impression that providing a quality service is more of a secondary concern and gobbling up as much information about users (and non-users) that they can use to turn a profit is their primary aim. They might claim otherwise, but then, why would they only address the issue after they found themselves in court?

While some protestation might seem like conspiracy theory, there’s definitely a pattern there that would suggest Google isn’t nearly as altruistic as it paints itself to be, and anyone using their services should think long and hard about giving such a gigantic company so much access to their personal data. That warning applies to every company, of course, but Google’s history with shenanigans makes it that much more apropos.

This warning is further compounded by incidents like this one, where Google was syncing user photos through Google Photos even after they deleted the app from their phone. Though they gave the usual corporate speech about how they were committed to making things “clearer” for users of their programs, one just can’t help but wonder, which leads to another interesting point.

2)The Terms of Service Aren’t the Most Reassuring

To be clear, Google is upfront about the fact that “You retain ownership of any intellectual property rights that you hold in that content. In short, what belongs to you stays yours.” Good so far, but then there’s this bit:

When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content. The rights you grant in this license are for the limited purpose of operating, promoting, and improving our Services, and to develop new ones. This license continues even if you stop using our Services (for example, for a business listing you have added to Google Maps).”

Now, some rightly claim that this is just giving Google the permission to use your data for derivative uses like their Google Translate service, and that, as they state on the onset, your intellectual property remains yours. It’s not a “gotcha clause” right? True, but Google is still holding on to your data, even after you leave, and as we’ve determined, they’re none too shy about continuing to use that content to their own ends and continue to exert their dominance as global overlords of personal data.

Don’t forget about this either:

We may modify these terms or any additional terms that apply to a Service to, for example, reflect changes to the law or changes to our Services. You should look at the terms regularly. We’ll post notice of modifications to these terms on this page. We’ll post notice of modified additional terms in the applicable Service. Changes will not apply retroactively and will become effective no sooner than fourteen days after they are posted. However, changes addressing new functions for a Service or changes made for legal reasons will be effective immediately. If you do not agree to the modified terms for a Service, you should discontinue your use of that Service.”

So, they can “change the game” on you when they see fit, and conveniently claim that they’re just trying to comply with new laws. As you might have already guessed, this poses another interesting conundrum.

3) They Still Have to Comply With World Governments

Sometimes government intervention isn’t so bad. Other times, they’ll come up with any reason they like to snatch up private details for little to no reason at all. Remember the Patriot Act? PRISM? Expanding snooping on civilians that ballooned under President Obama and may well continue throughout the Presidency of Donald Trump?

At least Google is (supposedly) transparent about all those requests for user information that they receive from government entities, and, as they state they “aim to put users first” whenever they get such requests. Still, that wording is less-than-clear, and anyone planning on using Google file sharing for any reason should keep in mind that, if the government wants it, they can just ask Google for it.

4) Security Holes Do Pop Up from Time To Time

It’s the nature of just about any platform. Bugs will arise, and Google has had their share. There was the “anyone who has the link” fiasco, wherein the shareable link could enable crafty third parties to sneak a look at private data “without further authentication.” It was patched, but these sorts of issues aren’t uncommon.

More recently, Wired reported on the potential of shortened links being exploited to spy on people’s Google Maps information:

To fully illustrate the creepy potential of that publicly accessible mapping data, the researchers went so far as to identify one “young woman” who had shared directions to a Planned Parenthood facility. Starting with the Google Maps data from shortened URLs that pointed to her home, they were able to confirm her address, full name, and age—thankfully none of which they shared in the paper. “That’s a very substantial privacy leak,” Shmatikov says.”

The broader point? Yes, Google dedicates a substantial amount of time to identifying and plugging vulnerabilities, but no service is perfect. With a large network like Google that has so much information at its fingertips, the implications of even unintentional privacy violations are thoroughly chilling.

5) Your Google Account Poses A Liability

“One account. All of Google.” That little service that Google provides to make it easier to access all their various platforms is intended to help, and indeed, it does make it easier just remembering one password for all of your Google “stuff.” On the flipside, though, this poses a risk from a security and privacy standpoint.

If someone can get into one of your accounts surreptitiously, or, through negligence you forget to log out of an account and leave your device open, all your accounts then become vulnerable. What’s more, services like Google Drive don’t log you out automatically, meaning you’re particularly susceptible to less-than-scrupulous individuals with ill-intent.

6) Two-Factor Authentication Can Help…

Thankfully, to curtail this problem, Google allows you to enable two-factor authentication on your account to make it more secure. In short, 2FA requires that you provide two different means of proving yourself before you can access the account. In the case of Google, it’s “something you know (your password) and something you have (a code sent to your phone).”

You can read the steps for turning on Google’s 2FA here. It’s bolstered by the fact that you can use an email recovery option to get back into your account if you for some reason forget your password, and can also get a passcode sheet in case someone does manage to circumvent the security on your account and changes your normal password.

7) …But Mobile Access Presents A Concern

Unfortunately, not even this method is foolproof, and savvy tricksters continue to discover ways around the two-factor system, either through clever workarounds or skillful social engineering. To make matters worse, you can completely bypass 2FA on mobile devices for increased convenience and flexibility. Sounds good, until you lose a device that you forgot to lock, and someone else is rummaging around all your Google accounts with no restrictions.

8) Phishing Is Still an Issue

The above raises another issue. For all that Google does to make Drive and their other services secure, the human element is always open to manipulation. The tricks range from spoofing the Google login page (which was fixed) to taking advantage of human nature to get people to grant access to their accounts unknowingly.

To keep yourself safe, you should arm yourself with the knowledge you need to identify and avoid phishing attacks and social engineering. With some study, you can learn to spot the signs that you’re being targeted and keep your passwords and other sensitive authentication information close to the vest.

The rule of thumb is to watch out for spam emails, make good use of encryption and firewalls, don’t email passcodes or other similar data, don’t click on links from unknown senders, and avoid entering any information in random pop-up screens (among others).

9) You’ve Got To Know How To Work The Options

Within Google’s File sharing network, there are lots of options that affect who can access and edit the data you store. Unfortunately, not all of these are as intuitive as Google might hope, which can lead to confusion and the potential for you to accidentally make something accessible to all that you meant to keep private. The only way around this is to familiarize yourself with the options Google allows for deeply, and know what you’ve got your various files set to.

For example, the aforementioned link sharing. If you turn it off, only you or specific people you designate can see the file in question. If you turn it on for “anyone with the link,” then only people you’ve provided the link should be able to see it, if you turn it to “on for the public,” anyone across the web can access that file (even through search engines). Make sense?

Other things you should take the time to research are editing features, sending attachments, owner privileges, and other such options that determine what specific users can do with specific files. There’s a lot of information to take in, but knowing about it all will help you better protect your privacy when using Google file sharing platforms.

10) Google’s Got a Big Target On Its Back

As a repository of untold tons of personal data, Google has long worn a target on its back for cyber attackers. The trend shows no sign of slowing down, and there’s a hefty list of attempts taken throughout the years to cite. Like this one, where, apparently, government intelligence agencies were attempting to gain access to Gmail to snoop on individuals, or Operation Aurora, a coordinated effort to glean sensitive information from the tech giant.

One might say that it comes with the territory of being such a popular service, but it’s something to keep in mind before choosing to use Google for file sharing purposes. Convenience is great, but are you comfortable with the risks to privacy?

11) You Might Want to Look Into Encryption

Finally, you might want to take some additional steps of your own to enhance your privacy when using Google’s services, as Google doesn’t use client-side encryption for the data you upload (meaning they can access the files in your account when they choose). Pre-encryption is a popular option, for preventing this, and you can read more here about getting it done.

Like most cloud-based solutions, it all comes down to how you want to balance security and privacy. In the end, this decision falls on you, but you should make sure you’re well informed about all of Google’s practices and the ways you can further protect yourself before making your final call.

11 Google File Sharing Facts That Are a Risk To Your Privacy was first published at http://www.cloudstorageboss.com/11-google-file-sharing-facts-that-are-a-risk-to-your-privacy/

Why Individuals & Businesses Should Use Cloud Storage

We’ve all heard about cloud storage. The practice of moving data off local hard drives and into web-accessible servers has become more and more ubiquitous in recent years, and there are scores of surveys and analytics showing the trend will continue hitting its stride.

Right Scale, for instance, reports that Enterprise workloads are shifting to the cloud and that both public and private cloud adoption is on the upswing. Meanwhile, analysis from Forbes shows that “28% of organizations’ total IT budgets” is socked away for cloud computing next year.

why individuals and businesses should use cloud storage

Impressive, but what all this data doesn’t clearly show is why cloud storage is such a hit. For that, we’re going to have to delve into the advantages it holds for both individuals and larger organizations.

The Cloud in Brief

We should start by making sure we have a good understanding of our definition of cloud storage. Most people have a tangential grasp, but miss a few of the crucial points of the matter. In the simplest terms, cloud storage refers to making use of online data housing (remote servers that reside inside data centers) that are owned and operated by a third party. You can park what information you want on these servers, then access them when you’d like from multiple devices.

This contrasts with storing files locally, where they are saved and accessible only from a device’s internal hard drive. Data stored “in the cloud” requires an internet connection to use, but, because of this, you can access and alter your data from multiple devices and in multiple locations. As you might imagine, this (along with a few other details) affords great benefits to cloud storage adopters.

How Cloud Storage Helps Individuals

On the individual level, cloud storage offers an unparalleled level of convenience and accessibility. Of particular value for freelancers and workers on the go is the ability to have your files in a place where you can get to them anywhere.

It isn’t uncommon in today’s high-paced working world for someone to have a whole slew of devices that they work from, and not always have the same one on them at all times. The average number of connected devices per person is edging ever closer to five as the overall number of connected devices multiplies.

Using the cloud, you can grant yourself the ability to work from anywhere, whenever you’d like, as your data is stored in a centrally accessible location, and changes made from any one device will sync so that you can see them from all others.

If you need to share a file with someone else, you need only send it to them online or grant them access to a shared cloud folder where they can view the information for themselves.

It also relieves you of the burden of trying to organize and track down files in many different locations. When everything is in one spot, it’s much easier to sort through and get to at a moment’s notice.

Cloud storage also affords users with an enhanced level of security for their data. Second only to perhaps a heavily encrypted hard drive, the cloud provides one of the safest places to store information.

This is because many cloud storage services make use of thorough encryption to keep data safe from brute-force attacks and other forms of unauthorized access. Coupling that with some individual best practices you can take regarding cloud storage, and you’re looking at a platform where your files are about as safe as they are going to get.

On top of that, keeping your data in the cloud means that if a device is lost or stolen, you won’t have to worry about files on your hard drive falling into the hands of someone else who shouldn’t have them. Speaking of which, storing data in the cloud is an excellent way of keeping a backup in the case a device is misplaced.

Since everything is tucked away on the internet, and your devices are merely providing a means of accessing your data, the loss of one doesn’t mean the loss of everything that you’ve done.

Lastly, using the cloud gives individuals a way to store more information than they otherwise might be able to by just using an internal or external hard drive. Many personal cloud storage options provide up to (or even more than) 1TB with inexpensive paid plans, making them a suitable alternative to even external HDDs.

How Cloud Storage Helps Businesses

The business applications for cloud storage are just as persuasive. Most notably, using third-party cloud storage helps organizations cut down on costs. In addition to saving on setting up an in-house data storage center, Businesses don’t need to invest continually in the maintenance of such a system.

Taking this component out of the equation lowers the costs of employing the necessary IT staff, getting the space, keeping the equipment in good order, etc. Those resources can then go to other aspects of the business instead.

Using a cloud-based system for storing files also increases the level of teamwork among your employees. They can all get to the latest versions of whatever documents you’re working on, and have access to them without having to be in a specific location or jump through complicated hoops.

This is especially useful for businesses that employ many remote workers or freelancers. They can get to the information they need without all having to be in the same location, again, cutting down on the overhead of maintaining a big office with dedicated space for a lot of workers. As the trend towards increased amounts of remote workers continues, this is one aspect that is hard to overstate.

Finally, the same advantages of security and data protection that apply to individuals apply to businesses as well. In the unpredictable event of a catastrophe at headquarters, all the crucial information is stored offsite and ready to be accessed once operations are back up and running.

In Summation

Cloud storage is here to stay. Knowing and taking advantage of its best features will be vital to both individual and organizational success. Best to continue following what’s on the horizon so that you’ll know exactly how using cloud storage options will benefit you.

Why Individuals & Businesses Should Use Cloud Storage was first published at http://www.cloudstorageboss.com/why-individuals-businesses-should-use-cloud-storage/

11 Things You Need to Know About Cloud Security

Cloud storage is an amazing advantage for individuals and businesses. Most know about the many benefits it offers—reduced storage costs, incredible ease of access, improved team communication, and data shareability.

All the luster fades a bit, however, when the topic of security comes to the fore. While most know that the cloud prevents against physical data theft, (as the loss of a device doesn’t grant interlopers immediate access to all your files) concerns abound about whether data stored on a server could be accessed by unscrupulous hackers or violated through some questionable powers granted ISPs and online networks through the government.

cloud security

The following is a list of eleven things you should know about cloud security that will help put the concept in better perspective.

1) Threats to The Cloud Are Real, But May Be Overstated

Undoubtedly, much of the fear regarding cloud security comes from scattered headlines about data breaches and perhaps a less-than-clear understanding about what it all means. Big businesses being targeted, international political intrigue, and EVIL RUSSIANS are all great ways for news outlets to get clicks, but are the threats as serious to businesses and individuals as these stories might make you think?

There’s some interesting data that might paint a grim picture for some. For instance, this article reviewing hacking statistics from 2015 and 2016. It shows, among other things, that:

There were 312 security breaches involving business, accounting for more than 16 million records being exposed. Hacking of businesses accounted for 40% of the security breaches occurring in 2015.”

In addition:

63 security breaches involving the government or the military exposed the records of 34 million individuals, accounting for 8.1% of the breaches incidents that occurred in 2015.”

What’s important to note, though, is that cybersecurity and specifically cloud security are growing fields. More and more businesses and individuals are hip to the fact that collaboration with specialists is the way to reduce risk, and now close to half of those potential targets are taking the necessary steps to protect themselves.

Furthermore, regarding the cloud, it generally isn’t the end target, rather, a tool that hackers use to further their goals. As one feature from CIO succinctly puts it:

Cloud security breaches aren’t necessarily headline news, but there’s a good reason for that: Cybercriminals don’t always view the cloud as the target of an attack, but often as a resource to launch an attack.”

So, while the cloud certainly can enable some cybercrimes, it shouldn’t be considered the end-all-be-all, as the intended targets often span beyond its purview.

2) There’s A Reason the Cloud Has Vulnerabilities

We’ll get to the human aspects of cloud vulnerability in a bit, but it’s important to understand that experts already understand many of the vulnerabilities of the cloud as it exists currently. As you can see, many of them are rooted in technical aspects of the cloud itself.

Internal threats include things like susceptible APIs (application program interfaces) which are often accessible from the open web, and a prime target for hackers to exploit. Alternatively, attackers might target “bugs” in programs that, thanks to the interconnectedness of the cloud, enable them to weasel their way further and further into a network.

Indeed, the fact that cloud systems share much of their technology is a critical factor in their potential vulnerability. When one component is taken advantage of, it opens the rest to exploitation unless the proper steps to confine the risk are taken in advance.

3) Cloud Storage Might Be the Riskiest of All

Since its inception, computing experts have decried the potential dangers of storing data in the cloud. Now, years later, you can read just about any article or post about cloud storage, and sure enough, you’ll see it listed as a significant risk. This report from Cloud Security Alliance provides some interesting insight, as they noted more than half of respondents viewed cloud storage as one of their greatest threats.

Of equal note, though, is the fact that only about four percent had a data breach related to their cloud applications in the year prior to the survey, and close to eighty percent were investing heavily in enforcing policies to keep this data secure.

The takeaway? While cloud storage might indeed present a risk, employing the appropriate countermeasures and remaining vigilant about monitoring what’s going on might be the best approach in making sure the risk doesn’t translate to actual data theft.

4) The Internet of Things Compounds Security Risks

More and more devices are becoming connected. Fitness trackers, GPS monitoring, and the like. These gadgets are often connected with cloud-based solutions, making them susceptible to some of the same threats that other cloud computing tools are plagued by.

Again, the news paints a grim picture. GovTech states that “there are an estimated 23 billion Internet-connected devices in homes and offices worldwide, and many have little or no security shield.” They site the novelty of the IoT as a significant weakness, and provide examples of this cloud-connected technology being exploited:

Days earlier, hackers used this so-called “Mirai malware” to identify hundreds of thousands of home and office devices that had weak security. The hackers then stitched those devices into a network that sent a blizzard of messages to Brian Krebs, shutting down the popular website he runs to expose cyber crimes.”

Meanwhile, coverage from DEF CON showed that “47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests.” They also brought this chilling quote from researcher Fred Bret-Mounet:

By exploiting these flaws I can shut down the equivalent of a small to mid-sized power generation facility or I can use that device as a trojan within a target’s network to spy on them.”

It all sounds dark, but perhaps there is some light at the end of the tunnel? According to this report:

Every vulnerability or privacy issue reported for consumer connected home and wearable technology products since November 2015 could have been easily avoided, according to the Online Trust Alliance (OTA).”

Again, proper preparation and respect for security protocols is the key to shutting down threats before they can even occur.

5) Big Companies Understand the Risks & Seek To Mitigate Danger

With all this fuss over security, you can be sure that the big boys have taken notice. Cloud-storage giants like Google have gone so far as to release an entire whitepaper on the topic of cloud security, and while it might not be possible to delve into every single detail, the thrust of their argument is clear. Security is a big deal for big businesses, and they’re taking every precaution they can think of to keep customer data private and anticipate what vulnerabilities may yet lay on the horizon. You can be sure other large providers are following suit with similar policies.

On top of that, the cloud security market is a growing one. Both businesses and individuals are aware of the danger, and security solutions are following suit to give them the peace-of-mind they crave when putting their stock in cloud-based technology at an ever-increasing rate.

6) Public Vs. Private Cloud Isn’t as Critical As You Might Think

For what seemed like ages, one debated that raged in the cloud community was the difference between private cloud resources and public ones. Was one inherently safer than the other? Was there some way to bring parity between the two options?

As it turns out, there’s not as much of a difference as initially believed. Private clouds might provide better control over data, but that doesn’t mean public clouds are, by default, less secure. Both options require that companies and individuals develop the proper strategy for safeguarding their information to become safer prospects for their users.

7) The Human Element Is a Big Deal

Many of the dangers the cloud poses come from people becoming lax about proper protocol. Using weak passwords, failing to engage multifactor authentication, and falling victim to avoidable “phishing” tactics all fall in the category of human-based risk. Nearly 60% of security incidents in 2015 were the result of employee negligence. This is unsettling, and amplified as the trend towards remote work and using personal devices continues to grow, but its only part of the human-related issue.

In addition to negligent employees, downright pernicious ones can wreak havoc on a business through a desire for revenge against a company or mere greed. With their insider knowledge, they can deftly manipulate or steal sensitive cloud data and severely disrupt operations. Like with all cloud-based challenges, though, preparation is the key to avoidance.

Rigorously training employees on proper protocol and taking steps to limit the damage that current and former workers can do to your systems is the way to go if you want to curtail instances of human-born catastrophe on your cloud systems.

8) Get to Know Hybrid Options

Hybrid cloud systems are a mix of the public and private solutions that make up cloud computing and have emerged as a method of providing greater flexibility and enhancing security. By splitting resources, some organizations have found that they aren’t as susceptible to total failure if one aspect of their network is compromised.

For instance, you could keep mission-critical devices (security cameras and the like) on the private network where they are easier to integrate while using the public systems for offsite data that might not be as crucial. There are multiple ways in which the hybrid option can be deployed, so getting familiar with cloud adoption practices before taking the plunge.

9) The Long Arm of The Law Poses Some Challenges

Earlier, we briefly mentioned the role of new laws in the privacy and security landscape. Some stances taken by lawmakers have caused alarm in those that value issues like data sovereignty and the ability to safeguard sensitive information from unsavory access by third parties. How the chips will fall isn’t an easy matter to predict, but one thing is clear—the law is going to factor into what steps companies and individuals will have to take in the future to keep themselves as secure as possible.

10) You’ll Benefit by Taking Some Matters into Your Own Hands

One thing that can hardly be overstated is the importance of taking control of your own security future. It starts with familiarizing yourself with the jargon. Getting to know the difference between your SSL, TLS, AES, and the meaning of terms like two-factor authentication, encryption, etc., will make you better equipped when it comes time to start your journey into the cloud computing sphere.

When you’re engaging an IT provider, make sure to ask the important questions: What cloud security policies do they adhere to? Where do they house their servers? Is the site secure? The list goes on. You’ll need to carefully build your security team, document your assets, and take measures to test your own vulnerabilities, locate serious issues, and correct them before they become a problem that outside influences can exploit. On top of that, it’s up to you to employ best practices in-house.

We talked about the human element earlier. Make sure you (or your employees) know the importance of using strong username/password combinations, don’t leave data lying around, and have some idea of how to detect possible attempts from the outside to phish for sensitive information. You should get in the practice of using encryption before uploading information to the cloud, and invest time into learning about industry standard protocol security to keep yourself safe.

The bottom line? Planning and preparation are crucial factors you can’t afford to overlook. Risks are inherent in any kind of computing, but you can navigate them by having the right tools for the job well in advance.

11) The Cloud Is Probably Here to Stay

Like it or not, the cloud has made a huge impact on computing and isn’t likely to just disappear anytime soon. The best approach? Making sure that you understand the ins-and-outs of this technology the best you can. Where applicable, get professionals in your corner who can assist with bolstering your security efforts and do your best to evolve with the rapidly changing landscape.

11 Things You Need to Know About Cloud Security was first published at http://www.cloudstorageboss.com/11-things-you-need-to-know-about-cloud-security/

How to Backup & Restore Your Whatsapp Data

The WhatsApp free messaging app is one of the most popular around, touting near one billion users worldwide. The service has rapidly evolved since its early days in 2009, but no matter how many upgrades it undergoes or iterations of the software the developers release, there’s one common question that users are continually asking themselves—how to backup their data in the event something goes wrong.

Be it accidental data wipe, damaged device, or theft of your smartphone, there are some very real threats that could put your WhatsApp data at risk. In addition, in 2017, several devices became obsolete, as WhatsApp ended their support for the platforms.

Thankfully, with a few cloud storage tricks, you can ensure that your information is saved and ready to restore on a new device in case of the worst.

Wait. Doesn’t WhatsApp Create Automatic Backups?

This is true. WhatsApp does create auto backups to your smart device’s internal storage at regular intervals. If you simply want to restore to one of these backups, then you need only access them through your WhatsApp chat settings (you can also switch automatic backups off from here, if they make you uncomfortable for whatever reason).

Here’s the rub: your automatic backups update every day, so if you want to get a hold of older messages, you might be out of luck. Furthermore, local WhatsApp backup is useless if your phone is lost, stolen, becomes outdated, etc., so this option only provides a limited amount of utility.

Alternatively, you could try a manual backup or WhatsApp data transfer. This works well for Android devices, as you just transfer all your WhatsApp information to an SD card, then use that SD card to upload the data to a new device.

Simply go to your smartphone’s file manager (where you can view the internal storage data), go to the WhatsApp folder, then copy that information to the SD card you have loaded on the device. You can keep that SD card in a safe place then use it in a new device to get your data back when installing WhatsApp again.

If you don’t have SD storage, or want another method to make sure you can get to older messages and have access to them in the event your device falls out of your possession, you’re going to need to employ some creative uses of cloud storage (quick refresher: cloud storage refers to storing data on remote, internet-accessible servers so that you can get to the information from multiple locations).

WhatsApp & Google Drive

Back in 2015, WhatsApp rolled out an integration feature with GoogleDrive that allows users to easily backup data to the cloud storage service. First, you’ll need to remember to use the same Google account for both your WhatsApp backup and restoration. WhatsApp helpfully lays out the step by step process right on their FAQ:

“Open WhatsApp.

Tap the Menu Button > Settings > Chats > Chat backup.

Here you can tap Back Up to create an immediate backup, and you can also tap on Back up to Google Drive to set up a backup frequency.

If you do not have a Google account already set up, tap Add account when prompted.

Tap on Back up over to choose the network you wish to use for backing up. Please note that backing up over cellular may result in additional data charges.”

They take care to note that while this is the easiest method for Android users, it can take a while to complete. Moreover, your backup data isn’t protected by their end-to-end encryption while it’s hanging out in the cloud.

WhatsApp & iCloud

As the Google Drive option is limited to Android users, iPhone owners must instead make use of iCloud to back up their data to the cloud. You can make an iCloud backup at any time that you wish by going to your WhatsApp chat settings and selecting the “Back Up Now” option.

This will upload your information to your personal iCloud account, which you can ten restore on a new device, provided you’re using the same iCloud account. Bear in mind that, at minimum, you must have iOS 7 installed on your Apple smartphone, and you should be signed into iCloud for the process to work correctly.

Alternatively, you could backup your entire iPhone via iTunes on your computer and restore that data on your current or future device using the feature. This method might take a bit longer, and there is a possibility you’ll lose some of your data but overall, it’s another solid alternative for you to consider, particularly if you’ve exhausted other options.

WhatsApp & DropBox / Other Cloud Services

With a bit of work, you can also use additional cloud services like Dropbox to backup your WhatsApp information (perhaps you’re not a fan of Google Drive?). You’ll need to make use of a secondary Android app to take data from your SD card and upload it to the cloud, but other than that it’s rather similar to the method we described earlier for copying data to an SD card to use later.

Some apps that enable this feature also come with the option of automatically syncing your smartphone WhatsApp data with the cloud at specified intervals, helpful if you’re somewhat forgetful about creating backups manually.

Going from Android To iPhone (Or Vice Versa?)

One question that constantly confounds users going from one operating system to another is how they’re supposed to handle backing up and restoring their WhatsApp info. Unfortunately, there’s no official WhatsApp feature to enable this, but there are a few workarounds that may prove useful.

When attempting to go from an Android device to an iPhone, the Email Chat transfer method allows you to save specific chats or WhatsApp history items to an email attachment and restore that saved data on an iPhone device.

For users going from iPhone to Android, several third-party apps exist that can either transfer WhatsApp data from an iPhone to a computer and then to an Android device, or take an iPhone backup and make it accessible via Android.

Conclusion

Make sure to review the methods discussed carefully and follow the steps that apply to your specific situation. Transferring WhatsApp data might seem daunting at first, but by making use of various cloud storage methods and following some simple instructions, you can navigate the process with increased confidence.

How to Backup & Restore Your Whatsapp Data was first published at http://www.cloudstorageboss.com/how-to-backup-restore-your-whatsapp-data/

Tuesday, May 2, 2017

IDrive Announces RemotePC Team Plan

Few cloud storage services are as popular as IDrive.

The cloud storage and syncing tool has a solid reputation, especially among small and medium businesses using the service for secure, streamlined collaboration.

Though IDrive has always been highly regarded, the company’s recent announcement of its all new RemotePC “Team Plan” ushers in even more exciting possibilities.

The so-called Team Plan is designed specifically for businesses. It combines the best features of RemotePC with new admin tools and business features.

Below we look at what the Team Plan brings to the table as well as the top features that RemotePC already boasts.

About RemotePC

About Remote PC

RemotePC is high among IDrive’s most popular core services.

It’s a remote access tool that enables employees to connect and get work done no matter their location.

Whether this means while employees are traveling, attending business meetings, or telecommuting from home, RemotePC makes working outside the office far more efficient.

Almost all aspects of a business can be accomplished from a separate location. RemotePC is perfect for collaborating and troubleshooting as well as training new hires.

Not only does RemotePC make life easier, but it also boosts employee productivity. Your employees will get more work done when they’re able to communicate with each other so effortlessly.

A remote access tool like RemotePC gives employees around-the-clock access to valuable company information regarding products, services, inventory, and the like.

The constant access helps your company’s bottom line. The more efficient your team is, the more revenue you’ll end up bringing in.

Even before the announcement of Team Plan, RemotePC has long been a useful tool for small businesses. Chief among its many features are file transfer, text chat, remote printing, record sessions, multiple monitor support, and 128-bit SSL encryption.

What is Team Plan?

What is Team Plan

The big problem with other versions of RemotePC is this: only one remote computer can access an account at once.

Sure, the program is still beneficial, but this severely limits the service’s uses for those that are running a small business.

Team Plan stops this problem in its tracks. The new plan allows over 100 computers to remote access a single account at once.

An assigned admin controls the account and monitors all users. A variety of new admin tools make this task easy.

An account admin, all from the convenience of a browser (no software required), can now use the RemotePC dashboard to:

  • Add new users
  • Organize users into teams
  • Manage remote access rights for users/computers
  • View user/computer session activity logs

Best of all, RemotePC is very user-friendly. The interface is so simple to use that no additional training is required for new users.

The set-up process is just as easy. After an admin invites new users, these users will be able to immediately use the remote access tool with few if any questions asked.

The new Team Plan significantly increases the effectiveness of RemotePC for businesses. Team members can now collaborate, train, and troubleshoot from nearly any location.

As mentioned above, the flexibility, convenience, and around-the-clock access of RemotePC greatly increase employee productivity (and thus a company’s bottom line).

Additional RemotePC Features

Additional Features

It’s not just the new features that make Team Plan tick. Many of the older features of RemotePC also benefit businesses.

The always-on remote access is by far the most important for businesses. You can configure business computers so that employees can remotely access them at any time. That way work can be accomplished no matter what.

Another effective RemotePC feature is one-time instant access. Use this feature to give people a one-time unique access ID and key. The person can then access a remote computer a single time without being able to do so again later.

The web-viewer interface is yet another highlight of RemotePC. The service is used entirely in a browser – no software required.

Finally, mobile access makes RemotePC even more effective. It’s available on both iOS and Android devices. Your employees can now connect to remote computers from their mobile devices while on the go.

How Much Does Team Plan Cost?

The RemotePC Team Plan from IDrive costs $499.50.

Team Plan gives you access to all the new admin tools and business features. It gives you access to up to 100 computers.

Access to more computers is available upon special request.

Who Benefits from IDrive RemotePC Team Plan?

Benefits of

Businesses of all sizes will benefit from IDrive’s new RemotePC Team Plan.

RemotePC has always been a useful tool, but Team Plan makes remote access and collaboration so much easier.

Team members can now access important company documents, files, and information from nearly anywhere – even from a mobile device.

The convenience of RemotePC makes your business more productive as a whole. Individual employees will be more easily able to accomplish their tasks.

IDrive puts a lot of emphasis on safety with RemotePC Team Plan. It’s protected by 128-bit SSL encryption for secure connections.

The only drawback to Team Plan is the high price. $500 is no big deal for some businesses, but also means that the service is out of range for some very small businesses out there.

Final Thoughts

IDrive is a company that is doing things right.

Their new RemotePC Team Plan takes the already powerful remote access tool to all new levels.

Designed specifically for business use, the team plan improves collaboration, training, and troubleshooting by giving employees around-the-clock remote access to up to 100 computers.

In addition to these new features, Team Plan offers all the other great features of RemotePC as well. These include always-on remote access and one-time instant access.

RemotePC Team Plan supports mobile devices (both iOS and Android) and features military-grade encryption.

With the IDrive name behind the service, you can rest assured that RemotePC Team Plan does what it claims to and more.

For even more collaboration and sharing benefits, pair RemotePC with other IDrive tools like IDrive or IBackup. Like RemotePC, these two other services are safe, secure, and extremely effective.

 

IDrive Announces RemotePC Team Plan was first published at http://www.cloudstorageboss.com/idrive-announces-remotepc-team-plan/

How to Edit PDFs on Your iPhone or iPad with Dropbox

There’s little denying that dealing with PDFs is a frustrating process.

Loading them is usually annoying and editing them is a whole new level of challenging. Still, PDFs are more than necessary for several applications. In fact, they’re often essential.

You know what’s even worse than editing a PDF on a computer? Attempting to edit a PDF on your mobile device.

Until recently, editing PDFs on your iPhone or iPad was frustrating enough to wait until you could do so on a computer.

Luckily, the recent integration of Adobe’s Acrobat Reader with Dropbox makes editing PDFs on mobile devices much easier. It makes it so much easier that I’ll edit PDFs on the go (no longer waiting until I have computer access).

Here’s the lowdown on exactly how to edit PDFs on your iPhone or iPad with Dropbox.

edit pdfs with dropbox

Integration with Adobe

Dropbox first announced its partnership with Adobe near the tail end of 2015.

The goal was to make working with PDFs on a mobile device simple, faster, and easier.

The first version of Dropbox with Acrobat Reader integration was for iOS devices only. Shortly after its release, in early 2016, an integrated version was released for Android devices.

Today, all Android and iOS devices can access the Dropbox app with Adobe seamlessly integrated.

So, what exactly can you accomplish with this exciting version of the Dropbox app? The options are nearly endless.

Chief among them is annotating and commenting on PDFs in your Dropbox from the convenience of your iPhone or iPad.

Better yet, all the changes you make to PDFs in your Dropbox are shared with any collaborators. Everyone stays up to date with the latest version of the project.

Of course, you’ve been able to edit PDFs with Adobe Acrobat Reader for a long time. You couldn’t do so seamlessly from the Dropbox app though.

Rather than require both apps on your mobile device, you can now accomplish all the same tasks with a single app.

Simply put, you no longer have to send emails back and forth, downloading then editing then uploading PDFs in the process.

If you need to sign a PDF file or enter more complex information, it’s as simple as clicking edit in the Dropbox app, entering the needed information, and then sharing with collaborators.

About Dropbox and Adobe Acrobat Reader

Easier editing of PDFs isn’t the only benefit of the integration of Adobe with Dropbox.

You also access some of the other features of this Adobe product as well as all the popular features of Dropbox.

Dropbox is a simple, elegant cloud storage and syncing platform. You can access your files from anywhere in the world, via computer or mobile device.

The platform makes it incredibly easy to share documents with others. Just upload the files, share them with the desired users, and collaborate on projects.

Dropbox also offers real-time collaboration. Office Online users will see each other’s changes appear on their own screens automatically after they happen.

In addition to its integration with Adobe Acrobat Reader and Office Online, you can also use Dropbox in collaboration with dozens of other powerful apps.

Adobe makes working with PDFs a cinch. You can fill out forms and sign documents from your computer or mobile device.

The app also enables more streamlined collaboration. Make edits and changes on a shared file, and all users will see these changes on their device.

As mentioned above, the integration of Adobe with Dropbox was a long time coming. It just makes sense that these two incredibly popular services work together.

How to Edit PDFs with Dropbox

Just so you’re clear – Dropbox also enables you to make edits to PDFs from its desktop version.

We’re here to talk about the mobile app though. Luckily, despite the smaller screen, editing a PDF on an iPhone or iPad is just as easy.

All you have to do is click “Edit” after first opening their PDF file in the Dropbox app. Clicking “Edit” in Dropbox automatically opens Adobe Acrobat Reader.

Then all you have to do is make your desired edits. Any changes you make are automatically saved to Dropbox.

The same goes for electronic signatures. If you have a PDF that requires a signature, simply sign electronically with Adobe and the document will be saved to Dropbox.

As mentioned above, any changes to PDFs are automatically shared with all collaborators to erase the need for needlessly emailing edited or signed PDFs back and forth.

Who Benefits from Dropbox and Adobe Integration?

“Who doesn’t benefit from the Dropbox and Adobe integration?” is perhaps the better question.

Anyone that uses Dropbox regularly is sure to appreciate this new feature. The same goes for those that regularly use Adobe.

Though Dropbox isn’t the only cloud storage solution available, a good chunk of Adobe users rely on it for their file storage needs.

Dropbox, on the other hand, no doubt added the integration so that its loyal users can more seamlessly store, edit, and share PDFs.

Even those that don’t work with PDFs won’t mind the integration. Dropbox and Adobe working together does nothing to negatively affect either app.

Adobe works in the background of Dropbox. It’s only brought to the forefront when it’s needed.

Final Thoughts

Dropbox has long collaborated with other powerful and popular apps and services.

Their recent partnership with Adobe is only one in a long stream of collaboration with top companies including Microsoft.

The Adobe integration only makes life easier for all Dropbox users. No longer is dealing with a PDF a hassle on a mobile device.

No longer do you have to download, edit, upload, and email PDF files that need to be signed or otherwise changed.

It’s now basically just a one-click process thanks to Dropbox and Adobe. Editing PDFs on your iPhone or iPad is easier than ever before with Dropbox.

 

How to Edit PDFs on Your iPhone or iPad with Dropbox was first published at http://www.cloudstorageboss.com/how-to-edit-pdfs-on-your-iphone-or-ipad-with-dropbox/

How Does Zero-Knowledge Encryption Work with Cloud Storage

Storing your data on the cloud is undoubtedly convenient – but it comes with its fair share of security concerns.

Your service provider has access to your data when you use a cloud storage service. So, what happens if that data is leaked or hacked?

The question plagues even the most reputable cloud storage providers. The best answer, for now, is zero-knowledge encryption.

Select a cloud storage service that utilizes zero-knowledge encryption for the absolute best online security and protection for your valuable files.

Here’s what you need to know about zero-knowledge encryption, including what it is, how it works, which providers offer it, and who needs it most.

zero knowledge encryption

What is Zero-Knowledge Encryption?

Zero-knowledge encryption is a pretty simple and straightforward idea to understand.

Simply put, your cloud storage provider never stores your username or password, not even on their own servers.

This lack of password storage might seem unimportant to those unfamiliar with Internet privacy and security at first.

Yet an increase in not only government surveillance of the Internet, but also a rise in the number of hackers, means that online security is more important than ever before.

Because the cloud storage provider doesn’t store your passwords on their servers, you must do all the work yourself.

They store the information related to your account in such a way that they can’t access it or open it, even if they tried.

You must enter all the information needed to access your data. There’s no way for the cloud storage provider to record the information you provide while logging in.

A good example is the “remember me” option you see while logging into some services.

Offering this feature requires the service to keep your login information in a cache. Those that provide such an option do not also offer zero-knowledge encryption.

There’s no way for the service to store this information without having access to your passwords and other login information.

How Does Zero-Knowledge Encryption Work?

zero knowledge encryption

Most online services, including traditional cloud storage providers, retain user login information.

This information is exactly what allows them to offer the abovementioned “remember me” feature that allows you to re-enter the service without typing your username and password each time you visit.

These traditional providers often place a sync folder on your hard drive as well. Most of the time this sync folder isn’t encrypted.

In addition to this sync folder, most traditional providers also place a cookie (or sometimes a meta tag) on your hard drive.

Finally, these traditional providers usually give users a way to enter their account if they lose or forget their password information.

Recovering your account information is typically done with a question/answer set up. You enter your pre-selected answer to a pre-selected question, and you can reset your login credentials.

Naturally, the way these traditional providers go about business leaves the door wide open to advanced hackers and others that want to access your information.

One of the most common ways hackers do this is by resetting the passkey saved to the provider’s server so they can then reset your login information.

Not only does this give them intimate access to the files you have stored with the cloud storage service, but it also enables the hacker to restrict you from accessing them yourself.

Zero-knowledge providers do away with these weak points. Not only are your files protected by encryption, but your login information is also completely in your hands.

You have complete control over your username and password. Additional infrastructure gives you complete privacy and secrecy.

These zero-knowledge providers keep no trace of your information, meta tags, or cookies.

Unfortunately, zero-knowledge encryption does come with a downside. If you forget your login information, there’s no way to access your account. You can’t recover the data protected within.

Of course, most people that choose a zero-knowledge provider over a traditional provider are well aware of this slight risk.

They prefer to be in complete control of their information because it’s the best protection currently available against internal and external hacking.

Who Offers Zero-Knowledge Encryption?

Like we’ve mentioned several times already, not all cloud storage providers offer zero-knowledge encryption.

In fact, most cloud storage providers don’t offer it. They offer users convenience (from not entering their username and password with each use) in favor of security.

Even more surprising is that some cloud storage providers don’t even offer adequate encryption (or any encryption at all) on their files. People with good enough hacking skills can easily access the stored files.

So, which cloud storage providers do offer zero-knowledge encryption? A few of the most popular include:

  • Sync – Files are encrypted before leaving your computer. No user login information is ever stored. Information is still protected during a breach.
  • SpiderOak – Login information is never stored on servers. All files are encrypted.
  • pCloud – Encrypts files on your computer before they’re sent to the server. No login information is stored for zero-knowledge.
  • Tresorit – Encrypts files and doesn’t store login information. A bonus is single-click syncing and backup.
  • Mega – Offers complete encryption as well as encrypted sharing of files. Doesn’t store login information.

With the popularity of zero-knowledge encryption on the rise, and the threat of hacking increasing, more and more providers are starting to offer the security feature.

We believe that the majority of cloud storage providers, as well as companies offering other online services, will offer zero-knowledge encryption shortly.

Final Thoughts

You don’t want to be caught using a cloud storage service that doesn’t offer zero-knowledge encryption if your files are sensitive.

Even if the provider you’re using is extremely trustworthy, there’s no reason to risk your login credentials (and thus your data) falling into the hands of hackers.

Zero-knowledge encryption is currently your best bet against hacking. And since cloud providers are often targeted by hackers, we strongly recommend seeking a service that offers this feature.

Even if your privacy needs don’t justify such a high level of security, the affordable price of many of these services makes selecting zero-knowledge encryption a no brainer.

How Does Zero-Knowledge Encryption Work with Cloud Storage was first published at http://www.cloudstorageboss.com/how-does-zero-knowledge-encryption-work-with-cloud-storage/