{"id":271,"date":"2018-06-16T11:51:57","date_gmt":"2018-06-16T06:21:57","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=271"},"modified":"2025-10-22T14:55:34","modified_gmt":"2025-10-22T09:25:34","slug":"security-tips-for-google-drive-android","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2018\/06\/security-tips-for-google-drive-android\/","title":{"rendered":"Security tips for Google Drive &#038; Android"},"content":{"rendered":"<p><strong>Google Drive:<\/strong><\/p>\n<ul>\n<li>Open Google Drive on web based browser like Chrome<\/li>\n<li>On each of the folders if you see a person symbol it&#8217;s shared, if you don&#8217;t see the symbol its not shared<\/li>\n<li>For each folder -&gt; click SHARE -&gt; Advanced -&gt; Check which user has view rights and which user has edit rights -&gt; Disable options to download, print, and copy for commenters and viewers -&gt; Prevent editors from changing access and adding new people.<\/li>\n<li>For each folder -&gt; click SHARE -&gt; Advanced -&gt; SHARE SETTINGS -&gt; Change -&gt; Check settings there are 4 to 5 options<\/li>\n<li><strong>Note -&gt; Even if your folder is not shared, files inside it can be in shared mode &#8211; This seems to be a big missing feature in Google Drive. There is no clear way to check this in one go for all files and we individually need to check each file. Workaround: Write Java code using Google Developers API to check this:\u00a0<\/strong><a href=\"https:\/\/developers.google.com\/drive\/\" target=\"_blank\" rel=\"nofollow noopener\">https:\/\/developers.google.com\/drive\/<\/a><\/li>\n<\/ul>\n<p><strong>Android security settings to explore:<\/strong><\/p>\n<ul>\n<li>Emergency info &#8211; Settings -&gt; Users -&gt; Emergency info -&gt; INFO &amp; CONTACT &#8211; Note: Can be seen on locked screen<\/li>\n<li>Settings -&gt; Security -&gt; Screen Lock<\/li>\n<li>Encryption ON &#8211; at-least Android 6 required, by default it&#8217;s on from 6\/7 onward &#8211; Settings -&gt; Security<\/li>\n<li>Settings -&gt; Security -&gt; Screen Lock -&gt; Gear button -&gt; Lock message<\/li>\n<li>Security -&gt; Install from unknown locations -&gt; Should be OFF<\/li>\n<li>Settings -&gt; Users -&gt; Guest user -&gt; Turn on phone calls -&gt; OFF<\/li>\n<li>Settings -&gt; Users -&gt; Add users while screen is locked -&gt; OFF<\/li>\n<li>Settings -&gt; Security -&gt; Make password visible -&gt; OFF<\/li>\n<li>Settings -&gt; Security -&gt; Set up SIM card lock<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Google Drive: Open Google Drive on web based browser like Chrome On each of the folders if you see a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":272,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40],"tags":[63,61,62],"class_list":["post-271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-android","tag-cyber-security","tag-google-drive"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Data-Sharing.jpg?fit=1920%2C1404&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-4n","jetpack-related-posts":[{"id":1494,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/10\/cyber-security-notes-for-2025-part-4\/","url_meta":{"origin":271,"position":0},"title":"Cyber Security notes for 2025 &#8211; Part 4","author":"Neil Harwani","date":"October 22, 2025","format":false,"excerpt":"Further to my four Cyber Security notes here: Information security tips while working with digital sources and internet | LinkedIn Security tips for Google Drive & Android | LinkedIn Facebook Privacy & Security tips | LinkedIn Post on patterns, anti-patterns & randomness in Cyber Security | LinkedIn Below I am\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":297,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/06\/facebook-privacy-security-tips\/","url_meta":{"origin":271,"position":1},"title":"Facebook Privacy &#038; Security tips","author":"Neil Harwani","date":"June 24, 2018","format":false,"excerpt":"Many of us use Facebook for various reasons like socializing on the internet, managing and participating in groups, creating and managing company pages, keeping in touch with friends and colleagues, sharing our updates & pictures, etc. But many don't pay attention to privacy and security aspects of using Facebook. Here\u2026","rel":"","context":"In &quot;Social Media&quot;","block_context":{"text":"Social Media","link":"https:\/\/www.techandtrain.com\/blog\/category\/social-media\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/06\/Facebook.jpg?fit=1200%2C797&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1049,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/03\/security-best-practice-patterns-architecture-links-from-aws-gcp-azure-part-1\/","url_meta":{"origin":271,"position":2},"title":"Security best practice, patterns &amp; architecture links from AWS, GCP &amp; Azure &#8211; Part 1","author":"Neil Harwani","date":"March 19, 2023","format":false,"excerpt":"Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure - Part 1. AWS: Security - AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) - AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance -\u2026","rel":"","context":"In &quot;Architecture&quot;","block_context":{"text":"Architecture","link":"https:\/\/www.techandtrain.com\/blog\/category\/architecture\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":271,"position":3},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":271,"position":4},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":141,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/03\/information-security-tips-while-working-with-digital-sources-and-internet\/","url_meta":{"origin":271,"position":5},"title":"Information security tips while working with digital sources and internet","author":"Neil Harwani","date":"March 30, 2018","format":false,"excerpt":"Setup OTP and recovery emails for all your accounts Check permissions that various apps have on your phone When you get an option - TRUST THIS DEVICE in Gmail or similar accounts, only select this option on your personal devices not public devices Keep your desktop, laptop & mobiles password\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/03\/Security.png?fit=991%2C720&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=271"}],"version-history":[{"count":3,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/271\/revisions\/275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/272"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}