<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Drive Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/google-drive/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/google-drive/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:13:41 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Google Drive Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/google-drive/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 091 Phishing for Credentials</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 20 Aug 2021 07:15:24 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Credential Phishing]]></category>
		<category><![CDATA[Credentials]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Google Account Login]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Google Drive Link]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Microsoft Account Login]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Phishing for Credentials]]></category>
		<category><![CDATA[SharePoint]]></category>
		<category><![CDATA[SharePoint Link]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2588</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials. This sounds familiar I covered something pretty similar back in #WeekendWisdom number 42 where I covered Consent Phishing. But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 91. This week we&#8217;re going to talk about phishing for credentials.<span id="more-2588"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2588-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4</a></video></div>
<h3>This sounds familiar</h3>
<p>I covered something pretty similar back in <a href="https://www.l2cybersecurity.com/weekendwisdom-042-consent-phishing/" target="_blank" rel="noopener">#WeekendWisdom number 42</a> where I covered Consent Phishing.</p>
<p>But credential phishing is where the criminals are going to try and get you to give up your login ID, usually your email address and your password. They can later on compromise your email account or perhaps log into your office systems to be able to execute a ransomware attack.</p>
<h3>How do they carry out phishing for credentials?</h3>
<p>The methods they use are varied, but a very sneaky one that they typically use is, they will send an email with an actual SharePoint link in there, or this could be a Google Drive link as well. People are very familiar with SharePoint links and Google drive links. They are usually fairly safe to click because these are things that people deal with on a day-to-day basis. They&#8217;re not some crazy dodgy site that you are being linked to. It&#8217;s something you&#8217;re familiar with.</p>
<p>Then when you click on the link, then it will say &#8220;Oh. You need to sign into your Microsoft account&#8221; or &#8220;&#8230; your Google account to be able to get into this document.&#8221; That&#8217;s where they catch you. They pop-up a login page and you give up your user ID and password in there. Now they have it.</p>
<h3>How can you protect yourself from this?</h3>
<p>So it&#8217;s really important that you implement something like multi-factor authentication to get an additional set of protections from these sorts of attacks.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-091-phishing-for-credentials/">#WeekendWisdom 091 Phishing for Credentials</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-091-lo.mp4" length="31363196" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 044 How Secure is the Cloud?</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 23:05:56 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Amazon S3 buckets]]></category>
		<category><![CDATA[AWS]]></category>
		<category><![CDATA[AWS S3]]></category>
		<category><![CDATA[AWS S3 buckets]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[How Secure is the Cloud]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[S3]]></category>
		<category><![CDATA[S3 buckets]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Shared Folder Security]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2277</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 44. This week we&#8217;re going to talk about how secure is the cloud? How Secure is the Cloud? That&#8217;s a silly question, isn&#8217;t it? Every day millions of people all across the world store data in the cloud. Now the cloud storage providers offer great tools and features for us to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/">#WeekendWisdom 044 How Secure is the Cloud?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 44. This week we&#8217;re going to talk about how secure is the cloud?<span id="more-2277"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2277-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4</a></video></div>
<h3>How Secure is the Cloud? That&#8217;s a silly question, isn&#8217;t it?</h3>
<p>Every day millions of people all across the world store data in the cloud. Now the cloud storage providers offer great tools and features for us to be able to secure our data on their infrastructure. But who is responsible for securing our data on their infrastructure?</p>
<p>You &#8230; or your IT team &#8230; or your security people. But it&#8217;s not totally the cloud storage provider&#8217;s responsibility to keep that data safe. They do have some responsibility but not as much as you might expect.</p>
<h3>Can I get a for example?</h3>
<p>For example, lots of us use things like Dropbox and Google Drive to be able to share data with people, including people outside of our organisations. Now after you finish a project with somebody and if you might have shared folders with them, do you go back in and revoke their access to that? Because if you don&#8217;t actively do so, they&#8217;re still gaining access to that data for months and years later. If you continue to use that folder, they&#8217;re still getting access to up-to-date data. So you have got to review any shared folders like that and revoke access where appropriate.</p>
<h3>Anything else?</h3>
<p>Similarly, on things like Amazon S3 buckets, which I talked about <a href="https://www.l2cybersecurity.com/cloud-security-your-responsibility/" target="_blank" rel="noopener noreferrer">three years ago</a>, a security firm last month had done an analysis and they found 4,000 Amazon S3 buckets that were publicly accessible. Very easy to get into and to find data. A lot of these S3 buckets had secret information in there, passwords etc.</p>
<p>So if you use Amazon S3 buckets, please do a good review on their security and put passwords on them and other security features. You might need to check to see if your staff might be using one quietly. You can get more details on <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/" target="_blank" rel="noopener noreferrer">Shadow IT here</a>.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Cloud Storage. When we find it, we can provide guidance on securing it appropriately.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-044-how-secure-is-the-cloud/">#WeekendWisdom 044 How Secure is the Cloud?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-044-lo.mp4" length="24671618" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 038 Shadow IT</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 23 Jul 2020 23:05:38 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Amazon S3 Bucket]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cloud Storage]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dropbox]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Breach]]></category>
		<category><![CDATA[Google Drive]]></category>
		<category><![CDATA[Internet Hotspot]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[USB Memory Sticks]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2233</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT. What is shadow IT? It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples: Used for risky Internet access&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 38. This week we&#8217;re going to talk about shadow IT.<span id="more-2233"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2233-3" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4</a></video></div>
<h3>What is shadow IT?</h3>
<p>It&#8217;s basically where staff or volunteers or contractors in an organisation use a technology that the organisation has no control over. No sight of and is unaware of. Here are three examples:</p>
<h3>Used for risky Internet access</h3>
<p>One would be where staff might use their mobile phones as an internet hotspot to be able to access the internet unrestricted, through their phone rather than through maybe a tightly controlled firewall on their local network. The risk here is that they may be able to access sites that may bring malware into the network and effectively they&#8217;re bridging the insecure internet to your local network.</p>
<h3>USB memory sticks &#8211; burn them with fire</h3>
<p>There&#8217;s always the risks as well associated with the use of USB memory sticks, that people are picking up at conferences and things like that. With no idea where they&#8217;re coming from. What&#8217;s on them. So there&#8217;s always been a risk around those.</p>
<h3>Cloud Storage &#8211; it&#8217;s only as secure as you can make it</h3>
<p>Finally if Staff were to use personal cloud storage services like a Dropbox or a Google drive or an Amazon S3 bucket, the organisation if they are unaware that, they don&#8217;t know how well secured those platforms are. They don&#8217;t know whether the data could be potentially breached from those cloud storage services. So there is a risk there.</p>
<h3>What&#8217;s the real problem that Shadow IT creates?</h3>
<p>And with all these technologies, the main risk here is in fact that they&#8217;re probably going to give you a breach of the GDPR in that you&#8217;re not in control of your IT security.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We can conduct an audit on your infrastructure and look for signs of Shadow IT. When we find it, we can provide guidance on how to remediate it to everyone&#8217;s satisfaction.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-038-shadow-it/">#WeekendWisdom 038 Shadow IT</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/07/WeekendWisdom-038-lo.mp4" length="25454938" type="video/mp4" />

			</item>
	</channel>
</rss>
