Securing Dropbox: 6 Steps To Take For Safer Cloud Storage
Fonte: http://www.makeuseof.com/tag/securing-dropbox-6-steps-to-take-for-safer-cloud-storage/If you use Dropbox, you may be in for some startling news. Despite the fact that Dropbox was the first to bring cloud storage to the masses, it’s widely accepted that Dropbox is no longer the best of its class. One big drawback is that the vanilla Dropbox isn’t very secure, which can be problematic if you’re storing private or sensitive data on your account. But don’t give up on Dropbox yet! With a bit of effort, you can make it more secure.
Keep in mind that this talk of security is in the context of account security so that no one else can intercept or hack into your files. As far as the NSA and the PRISM project are concerned, it’s highly doubtful that any of the following steps will prove effective as that’s an issue more core to the Internet than Dropbox itself.
Two-Step Authentication
Last year, Dropbox implemented the ability to use two-factor authentication, a type of log in method that involves more than just a password. As the name implies, this form of log in requires at least two independent steps to verify that you indeed have access to an account. Dropbox’s two-step authentication requires you to enter a password, then Dropbox sends a verification code to your phone.To enable two-step authentication in Dropbox:
- Log into your account normally.
- Click on your account name at the top right and select Settings.
- Click on the Security tab.
- Under Account sign in, find Two-step verification and click Enable.
- Follow the instructions to set it up!
Enable Email Notifications
Email notifications can be a pain, especially when they’re sent out more frequently than spam, but in this case I think you can make an exception. If you enable the feature, Dropbox will shoot you an email whenever a new device or a new app is connected to your Dropbox account. This feature could come in handy if someone tries to tamper with your account by making some sort of rogue connection to view or pull data.
Of course, in most cases, the one making a connection would need permission from your account to connect in the first place, which means they could probably disable the notifications before making their move. However, they could always forget, which means you’ll be notified if someone tries to do something sketchy.
Enable Selective Sync
Selective Sync is a feature of Dropbox that allows you to select which folders you want to keep synced with your account. Sounds pretty straightforward, right? For the most part, Selective Sync isn’t so much a security feature as it is a convenience and organizational feature, but it can be used to minimize exposure.
For example, say you keep your desktop, your laptop, and your tablet synced with Dropbox. If all of your devices were 100% synced all the time, then what would happen if your laptop or tablet were stolen? The thief would have access to every file. However, if your laptop only keeps a particular folder synced and your tablet only keeps a different folder synced, the thief would only have access to whatever is kept synced on that device.
Combining the Selective Sync feature with the Unlink Device feature (mentioned below), you can minimize accidental exposure of files in these kinds of situations.
Unlink Extraneous Devices and Apps
Whenever a device or app makes a connection to your account, Dropbox tracks it. Under the Security tab of the Settings page, you can view a list of all devices and apps that currently have permission to access your Dropbox account. This is, of course, very useful when you want to cut off someone’s access since they can’t reconnect without your account credentials.
This can come in handy with Selective Sync. Say your laptop syncs with a particularly sensitive folder but it was stolen while you were in the café bathroom. You could drive home, log onto Dropbox, and unlink your laptop from your account, which cuts off the thief from accessing any more data. They’ll still have whatever local files are on the laptop, but at least you can cut your losses here.
Use an Encryption App
Perhaps the strongest way to improve your Dropbox account’s security is to start using a third-party encryption app. What’s that, you ask? It’s a program that will keep your files encrypted on the fly without requiring you to do much of anything. Encryption is good because even if someone happens to intercept or hack into your account, they’ll still need to decrypt the files which won’t be too easy.
Fortunately, you have a few options to choose from. BoxCryptor (our review) might be the most well-known for Dropbox, but Viivo is an alternative that looks good. A more general encryption solution that works well with Dropbox is TrueCrypt, though it has a bit of a steeper learning curve than the previous two apps. However, once you learn it, you’ll find that it’s pretty powerful. Check out our TrueCrypt guide if you want to delve deeper.
Use a Stronger Password
We’ve all heard it time and time again, but the safest practice still remains to use unique passwords for all of your accounts and to make sure those passwords are strong. Dropbox is no exception. In fact, using a universal and stagnant password is one of the most common security mistakes you could make and you leave yourself vulnerable by doing so.
Conclusion
Again, Dropbox isn’t the most secure cloud storage service out there. We’ve written about secure alternatives to Dropbox before, but for those of you who wish to stay with Dropbox for whatever reason (I’m still a Dropbox user), the tips above will help you maximize your account’s security. In the future, we can only hope that Dropbox continues to implement increased security measures.- - -
TrueCrypt User’s Guide : Secure Your Private Files
Fonte: http://www.makeuseof.com/tag/download-lockdown-secure-your-files-with-truecrypt/To really keep your data safe, you need to encrypt it. Not sure how to start? You need to read our TrueCrypt user manual by Lachlan Roy, and learn how to use TrueCrypt encryption software.
Encryption is used all the time, often without you even realising it. Whenever you buy something online and make a transaction, all your details are heavily encrypted until they reach the other end, making sure that no third party could be listening in. If you use instant messaging programs it is possible to create an encryption tunnel to ensure that only you and the person you’re talking to can see the messages.
Enjoy!
§1–Introduction
§2–What is encryption?
§3–What is TrueCrypt?
§4–Installing and Using TrueCrypt
§5–Other Good Security Habits
§6–Conclusion
1. Introduction
The Changing Laptop Market
Your laptop has been stolen.You left it there for just a second and there were plenty of people around, but you came back and it was gone. It takes a moment to sink in.
It’s gone.
First comes the initial shock, then the disbelief. Maybe I just put it down by the chair so that it was out of the way… Nope. It’s not there either. It’s been taken.
“Damn”, you think. “I’m not getting that back.” But it’s not that bad. It was an old laptop, faithful but due for retirement.
But then it hits you.
My email account.
My bank details.
My personal details, and the details of all my friends and family.
The financial reports for my business. The pictures of my family.
I’ve got them all backed up, but that’s not the problem here. They’re out there in the wild, now. Who knows where they could end up and who could see them? Who knows how that information could be exploited? What am I going to do?
The world shrinks around you as you realise the enormity of what has just happened. If only you’d encrypted your data.
2. What is encryption?
Encryption is the process of protecting data by using an algorithm to scramble it. The data is unintelligible, undetectable, unreadable and irretrievable unless a key is used to reverse the encryption, or decrypt, the data.Encryption is used all the time, often without you even realising it. Whenever you buy something online and make a transaction, all your details are heavily encrypted until they reach the other end, making sure that no third party could be listening in. If you use instant messaging programs it is possible to create an encryption tunnel to ensure that only you and the person you’re talking to can see the messages.
In this manual we’ll be talking about local file encryption – that is, encrypting files on a hard drive (or encrypting the entire hard drive; more on that later). The files are safe as long as they are kept in the encrypted area.
2.1 What do I need encryption for?
If you have files that you don’t want (or can’t afford) anyone else to see, then you have a use for file encryption. Its entire purpose is to keep files hidden and safe.2.2 Advantages of encryption
The biggest advantage of encrypting your files is the knowledge that your data will be safe if your computer is stolen. As soon as your computer is turned off you’ll know that all your files are inaccessible, and may in fact be locked earlier depending on the type and level of encryption that you use (more on that later).When you sell your computer (or dispose of it by other means), it’s always a good idea to make sure that your data is securely erased to prevent the recovery of deleted files by whoever comes across the computer next.
The great thing about data encryption is that, without the key for decryption, the data appears as random noise. Unless the person happens to know the decryption key (which is highly unlikely), you might as well have already securely erased the drive.
2.3 Disadvantages of encryption
Unfortunately, encryption’s strength is also its weakness. Encryption is great at keeping people without the decryption key out. The problem: if you’ve forgotten the password that includes you too. Once that data is encrypted and you lose the key you might as well have securely deleted the files, and you’re not getting them back.While it’s nowhere as dire as losing the files forever, another disadvantage of encryption is that you will lose some read/write performance when working with encrypted files (that is, opening files, saving them and/or moving them around). While this decrease is imperceptible when working with a few small files, working with thousands of tiny files or a few really big ones will take significantly longer as each file is decrypted before it can be used.
Thankfully, TrueCrypt supports parallelization (splitting data between the multiple cores of most recent processors), which means that in even these circumstances the drops in performance are minimized.
3. What is TrueCrypt?
3.1 Different types of encryption
There are three main types of encryption, each with a different level of technical difficulty to implement and with its own advantages and disadvantages. We’ll be taking a look at each of them and eventually finding out how to set each one up.3.2 Virtual encrypted disk
The virtual encrypted disk (VED) is the quickest and easiest type of encryption to set up. It works by creating a file of a specified size that can then be mounted. Basically, it acts just like an external hard drive. When you unmount the VED the files inside are invisible – only the VED file itself is visible and appears as random data when analysed at the hardware level.Using a virtual encrypted disk has a couple of downsides. The first is that, because the file is its own discrete file that is stored in a folder like any other file, it can be quite conspicuous and stand out easily. It is also easy to accidentally delete the file and all the files in it. However, being a separate file also has the advantage that it can be moved around easily.
The other main disadvantage of a virtual encryption disk is that you must choose how large you want it to be when you create the file. This file cannot be resized easily and takes up the entire amount of space straight away, which can be troublesome if you make it too big or too small to begin with. Too large, and you’ll be wasting hard drive space; too small, and you’ll run out of room when you go to store more documents.
If you’re using Windows it’s possible to create a dynamic VED; that is, one that starts small and only increases in size as you add files to it. However, a dynamic VED is much slower than a standard one, is no longer cross-platform and is a lot easier to detect than it would be otherwise.
3.3 Partition/drive encryption
Partition/drive encryption covers an entire drive (or one of its partitions, if your drive happens to be divided up). It’s a little more complicated to set up than a VED, but it has its own rewards. For example, as the encryption covers the entire hard drive it is arguably less conspicuous while casually browsing files, and it is a lot harder to accidentally delete your important files. You also don’t need to worry about the size of a virtual drive, as the entire partition is encrypted.The big downfall of encrypting the entire drive is that it takes a very long time to set up, mainly because TrueCrypt has to create random data and write it to the entire hard drive. The other thing to bear in mind is that because you’re encrypting the whole drive you won’t be able to use any of it without the key. If you lose your password then you won’t be able to use the drive without losing everything.
3.4 System encryption
The last main form of encryption goes one step further than encrypting your data – it encrypts the entire operating system and all the data on that partition with it, requiring you to enter your password before you get to the operating system (this is known as pre-boot authentication). However, this particular type of encryption through TrueCrypt is only compatible with Windows. Never fear, though! Mac OS X and most Linux distributions have some form of system encryption built in to the operating system itself, so they just require you to turn it on in the system preferences.System encryption is the most secure, but it also has the most at stake. If you lose your password, you’ll not only lose access to your encrypted data, but to your applications and the rest of your computer, too. This is fine if you have another operating system on a separate drive or partition to fall back on (or if you have a Linux Live CD), but if you don’t you’ll be stuck without your computer. Either way you’ll be forced to erase everything on the drive and reinstall everything from scratch.
This isn’t a problem so long as you write down your password in a couple of places so that you don’t forget it, but it’s definitely worth bearing in mind.
The other thing to take into account is that encrypting the operating system is by far the most complex encryption type so will take a lot longer than the others to set up and is more likely to have something go wrong. This would most likely entail the TrueCrypt Boot Loader (which comes up before you boot Windows and is where you enter your password to decrypt the system) becoming damaged and failing to load (and locking you out of the system).
With this in mind TrueCrypt requires you to create a rescue disc that you can use to decrypt your installation in case something goes wrong.
3.5 Which type of encryption is best for me?
The vast majority of users will want to use either the virtual encrypted disk or encrypt a whole drive or partition. Which one is “better” depends on how much you want to encrypt. If you only have a couple of GB or less of sensitive data there’s little point in encrypting an entire drive, especially as it makes it a lot harder to move the encrypted data around.There are very few scenarios in which encrypting the entire operating system is the recommended choice, considering the number of things that could go wrong and the consequences if the password is lost. If you’re working with data sensitive enough to require the entire operating system to be encrypted then the chances are you aren’t setting it up yourself.
To summarise: you’re probably best off using a virtual encrypted disk unless you either have a lot of sensitive data or a very small drive/partition, in which case you might as well encrypt the whole thing.
4. Installing and Using TrueCrypt
4.1 Downloading TrueCrypt
The first thing you’ll want to do is go to the TrueCrypt download page at http://www.truecrypt.org/downloads, and choose the download for the operating system that you’re using.Each platform has a slightly different installer. For Windows you download an .exe file that is the actual installer. For OS X you download a .dmg image file that you mount to reveal the installer file (which is a .pkg file). For Linux you need to choose either the 32-bit or 64-bit version (if you don’t know what this is, download the 32-bit one). This will download a .tar.gz file (which is just like a .zip file) which contains the installer file which you can extract and then run.
4.2 Installing TrueCrypt
The process of installing TrueCrypt is very similar for Windows and OS X and is just a case of following the instructions on each screen. It’s just like installing any other application, so you shouldn’t have any problems.If you’re using Linux then the process is a little different, but it is still very straightforward. Once you’ve extracted the installer somewhere (your desktop, for example), you’ll see this:
After that you’ll be met with a black and white installer that looks like this:
4.3 Creating a virtual encrypted disk
Regardless of what platform you’re using, when you open up TrueCrypt for the first time you’ll see this window (although in Ubuntu and Mac OS X the drives are simply numbers and not drive letters like they are here):The wizard looks like this:
Now we’re going to choose how much space we want to allocate to our VED. I’ve chosen to give 250MB to this one:
4.4 Encrypting a drive or partition
Just like creating a VED, the first step is to click on “New Volume” in the main TrueCrypt window. However, instead of selecting “Create an encrypted file container”, we’ll be selecting “Encrypt a non-system partition/drive” before clicking on the “Next” button.Go get a cup of coffee – this is going to take a while. Once you’ve finished encrypting the drive you’ll have a few more dialog boxes pop up to give you some important instructions with regard to mounting the drive.
Once you’ve taken those on board, you’ll be greeted with the last window:
4.5 Mounting and dismounting encrypted disks
Mounting an encrypted disk is fairly straightforward. First we’ll look at mounting a VED. In the main window we’ll click on “Select File…” and select the VED that we created earlier. We’re then asked to enter the password for the archive. It’ll look a little like this:5. Other Good Security Habits
5.1 Selecting good passwords
It’s very important that you choose good passwords to keep everything secure. There are a few things to keep in mind when selecting passwords to use. The first thing may seem obvious, but it needs to be said: make sure you use different passwords for everything! It doesn’t matter how secure your password is; if you use the same password for everything and somebody manages to learn it, they’ll have access to your entire digital life. That’s not fun.Secondly, your password actually needs to be secure. Setting your password as “password” or the name of your cat may be easy to remember, but they’re also the first things that somebody trying to access your data is going to try.
A good password is one that is easy to remember but hard to guess or crack. This means that you can one of two routes:
• Go for a really, really long password. For example, the password “TheRainInSpainStaysMainlyInThePlain” is 35 characters long – long enough that no hacker is going to be able to figure it out and trying to crack it by brute force (using a computer to go through all the possible combinations) would take far too long. The only problem is that some websites or programs may set a limit to how many characters you can use.
• Go for a complex password. These should still contain at least 8 characters but includes upper and lower case characters, numbers and symbols to make the number of possible combinations for a shorter password much larger. “nES+=3ux” is an example of a complex password.
I personally prefer the complex route, as it’s faster to type. “But Lachlan!” I hear you say, “How am I ever going to come up with a random password with symbols and numbers in it, let alone remember it?”
When I need a new password I’ll usually come up with a sentence that is easy to remember, for example “All for one and one for all”. Then I’ll take the first letter of each word – “afoaofa”. Right now it’s not a complex password, but we’ll get there.
Next we can change the “a” for “and” to an “&” sign. This gives us “afo&ofa”. Now we need a number or two. The number 4 looks like an upper case “A”, so we can change one of them out, and we can change the word “one” for “1”. Doing that we end up with “afo&1f4”. Starting to look better, isn’t it?
If we make the first “a” a capital (like at the start of sentence), and add in a couple of punctuation marks at the start and end of the password we end up with something like “!Afo&1f4?”. Have fun trying to crack that! It’s still pretty easy to remember, though:
All for one and one for all -> !Afo&1f4?
If you’re not feeling particularly creative you can always use an online password generator; I’ve personally found pctools.com’s password generator to be the best. Regardless of what password you use or how you come up with it, it’s a good idea to test the strength of your password; passwordmeter.com is great for that.
5.2 Locking your computer and logging out of services
It goes without saying that a password is pointless if it’s not being used. Your computer may be protected by an awesome password that stops people from logging in. But what happens if you log in and then walk away for your computer for a while? Anybody could sit down and get at any of your files (unless you’ve got them in a virtual encrypted disk, that is!)The quick and easy solution to this is to lock your computer whenever you leave it and go elsewhere. If you use Windows you can press the “Windows” key + L to lock your screen; if you’re using Ubuntu, you can press “Ctrl”+“Alt”+L.
If you’re using a Mac there’s no keyboard shortcut, but it’s still possible to lock your screen. There are a couple of ways you can do this:
5.3 Screensaver Lock
Simply go to System Preferences, click on “Security”, then select the first option: “Require password after sleep or screen saver begins”. You can select a period of time before the password is required ranging from an immediate lock up to 4 hours. If you want to lock the screen quickly you can then set one of your “hot corners” to start your screensaver. The setting for this is under “Exposé” in System Preferences.5.4 Login Window
Alternatively, you can go to System Preferences and then click on “Accounts”. Next, select “Login Options” towards the bottom of the window and select “Show fast user switching menu”. This puts an icon or your username in the menu bar. You can click on this and then click on “Login Window…” to lock your screen.You can also set the screen to lock after coming out of the screensaver on the other operating systems – the option is usually under the screensaver settings.
This is all well and good if you’re using your own computer, but what if you’re using a friend’s computer, or a public one?
Just make sure that you don’t tell the browser to remember any of your passwords and that you log out when you’re finished. That way there’s no chance that somebody can get access to your data without you knowing about it!
6. Conclusion
Your laptop has been stolen.You left it there for just a second and there were plenty of people around, but you came back and it was gone. It takes a moment to sink in.
It’s gone.
First comes the initial shock, then the disbelief. Maybe I just put it down by the chair so that it was out of the way… Nope. It’s not there either. It’s been taken.
“Damn”, you think. “I’m not getting that back.” But it’s not that bad. It was an old laptop, faithful but due for retirement.
But then it hits you.
My email account.
My bank details.
My personal details, and the details of all my friends and family.
The financial reports for my business.
The pictures of my family.
I’ve got them all backed up, but that’s not the problem here. They’re out there in the wild, now. Who knows where they could end up and who could see them? Who knows how that information could be exploited?
But hang on a second. All my business files are in a virtual encrypted disk and the rest is on the second partition that I encrypted, and I locked my screen before I put it down. Even if they do manage to get past my 15 character complex password, they’re not going to be able to get at my personal data.
I guess it’s not so bad after all.
Thank goodness I encrypted my data!
When you use Quicken Online Services, you may encounter Quicken Error OL-292-B. Are you getting worried when facing this error? Just chill! In this guide, we will let you know how exactly the error code could be annihilated.
ResponderExcluirquicken error ol-221-a|
Quicken Error CC-501
Quicken Error CC-502
Quicken won't open
When you open a QuickBooks Company File, you may encounter QuickBooks Script Errorand due to lack of technical knowledge you won’t fix it. In that case, you simply need to read the blog as here we discuss in details.
ResponderExcluirQuickBooks Error 80070057
QuickBooks Error Code 404
Capital One QuickBooks Error Code
QuickBooks Error Code 15106
QuickBooks Error 1328
Why Is My Windstream Email Not Working
ResponderExcluirWindstream Email Password Reset
Windstream Email Settings
Windstream Email Support Number