Story image

New app encrypts your data on Google Drive

11 Feb 16

Syncdocs has released an app to add end-to-end encryption for Google Drive and provide users with greater security.

Recently, Google has offered 2GB free extra Google Drive storage for users who check their security settings. However, many recent hacks have highlighted how vulnerable data stored on servers can be, says Syncdocs.

Protected only by access permissions, any hacker gaining super-user permissions can access everything. The most effective method to prevent this is to encrypt the data at-rest, the company says.

While numerous methods already exist to encrypt data at-rest for on-premises IT, Syncdocs is the first solution to provide fully automatic end-to-end encryption for Google Drive, the company says.

Google currently only encrypts the Google Drive data while in transit, which means anyone who can hack the Google account or a Google Domain administrator, can access a user’s Google Drive files.

Syncdocs encrypts Google Drive files locally, before they leave the users laptop or phone, making accessing data much harder for hackers.

Files and folders are securely protected in the cloud with military-strength AES256 encryption. This is important for protecting corporate or customer data stored in the computing cloud, Syncdocs says.

Syncdocs also offers enhancements to Google Drive, chiefly:

  • Multiple accounts can be used concurrently. This is especially useful for users with separate home and work Google accounts.
  • Folders are synced from anywhere on a PC or network, not just the single folder dictated by Google.
  • Syncdocs can be deployed in the enterprise with fully automated, scripted installations.
  • All Google data is backed up, even Google documents and spreadsheets.
  • Migration from Microsoft Office to Google Docs.
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.
Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.