6 steps required for complete safety of your Dropbox
Technologies / / December 19, 2019
A few days ago we told you about Dropbox how to pump extra 25GB (Does not work if you do not have an honest .edu email address). This means that now there will be even more of your personal files and data. Take a couple of minutes sweep possible causes access to this data by third-party persons.
Two-level authorization
Two-level authorization is the bottom line, only one for Dropbox users - if the attacker will login and password of your account, it will still not be able to get access to your account and valuable files that you are in it store.
How to set up such authorization.
Dropbox disconnect unused devices for a long time
All devices that links to Dropbox, have the right of access to data. They need to be cleaned periodically. Here in what a state of neglect, my list of devices - clean definitely!
Here it is now well :)
Also, below there is a list of web browsers that are currently open authorization.
Get notified of the permissions changes
Sign up for emails with a notification that your account is connected a new device or a new application. This will be the first signal for you if someone will get into your account without permission.
Manage third-party applications with access
Right here https://www.dropbox.com/account/security#applications is a list of applications that have access to your account. Remove all unnecessary or unused for a long time.
Use a unique password only for Dropbox
This is not the advice of Captain EO, a warning about the most probable cause of hacking your account. Users use the same password is very secure and important services on any formuma in which the passwords are stored in clear form. If at least one account with your e-mail as a login is broken, then the resulting password will approach to everything, including Dropbox. Be careful.
file encryption
Most advice for paranoid, but behold the same - you can encrypt your Dropbox-folder. so that locally and in the cloud to store encrypted files. We recommend using the secure operating system with strong passwords and access rights to a local folder. Remember, encrypting data, you run the risk of losing them once.