Dropbox has shown itself to be one of the top cloud services for file storage and sharing. It can be accessed from any computer, laptop and even mobile devices. But there are risks when you upload data to the cloud. Here are five tips to help you secure Dropbox to ensure protection of your personal or company files.
- Two-Step Verification
- Control and monitor which computers are authorized and browser sessions are open
- Control and monitor which apps which have access to your Dropbox
- Encrypt very confidential files using BoxCryptor or TrueCrypt
- Backup and replicate your Dropbox data to a separate cloud service
This authorization method is strongly recommended as it will help prevent hackers and unauthorized users from accessing your account. The two-step verification method uses your username and password for the first step and mobile phone identification for the second step. This means that anyone attempting to access your account will need your online credentials, as well as access to your mobile phone.
Logon to Dropbox and click on your account name. Click on “Account menu” and then click “Security.” You will see the option for two-step verification. Click to set custom HTML and you will be sent a temporary code to your mobile phone for authentication. You have the option of receiving the code via SMS text or by an authentication app such as Google Authenticator that you must install on your phone.
SMS is the easiest option and does not require you to install any apps on your phone. If you decide to use an app such as Google Authenticator, just click Settings and add a new account. Then you can add the Scan or the Manual option, whichever you prefer.
Control and monitor which computers are authorized and browser sessions are open:
Dropbox provides a little of its own security and you can find the settings under the aptly named “Security” tab in your Dropbox account. Here, you can control all devices that have access to the Dropbox account under the list titled “My Devices.” This will give you the device name, what country it is located in, how long ago the most recent activity was enacted and gives you the options to rename or unlink any of these devices.