For Business

Protect Your Personal Data in the Cloud with Encryption by GoodSync

According to an article on Statista[1], in 2018, almost 2 billion people worldwide used personal cloud storage, and it keeps growing. Using four-year-old data, Eurostat[2] calculated that every fifth European (20%) saved files on the Internet in 2014.

According to another article on Statista [3], 44% of cloud storage users are concerned about the privacy of their data.

If you are reading this, you are most likely using or at least considering using one of the cloud file storage services, and you may even be worried about other people obtaining unauthorized access to your data. And if for any reason you’re not, you definitely should be.

The Conversation site in their January, 2018 article “How secure is your data when it’s stored in the cloud[4]?” mentions that none of the popular cloud file storages including Google Drive, Dropbox,  Box, Amazon Drive, and Microsoft OneDrive, allow users to encrypt their data and keep the key.

What does that mean for you?

If you are using one of the popular cloud file storages, companies that operate these services can obtain access to your data. They can analyze your data. They can share your data, and you often don’t have control over who sees your data. For example, some companies may decide to share user data with authorities under conditions where you would have chosen to not do so yourself.

How do you protect yourself from that threat?

There are two choices: you can build your own cloud (an excellent choice for mid- and large-size companies; GoodSync has all machinery for that) or you can use GoodSync to encrypt your data on the cloud service of your choice.

GoodSync is a cross-platform file synchronization tool that supports all major cloud file storages including Google Drive Files, Google Team Drive, Google Docs, Amazon S3, Amazon Cloud Drive, Dropbox, Box.com, Backblaze B2, OneDrive / Office 365 / SharePoint, SharePoint 2013, MS Azure Blobs, MS Azure Files, as well as any other server connected through Secure FTP (SSH), FTP, or WebDAV. GoodSync also has its own built-in encrypted and compressed storage called OneFile.

GoodSync supports one-way or two-way synchronization. When you create a new synchronization “Job”, you can select two folders that you want to keep in sync. Normally, one of your folders is local (let’s keep it on the left side) and the other is remote (let’s keep it on the right-side).

To encrypt your files on the cloud storage of your choice, go to the Right Side section of Job Options (Job->Options), check the “Encrypt File Bodies and Names” checkbox, and specify the password that will be used to encrypt names and bodies of your files on the remote side.

Encrypt1

The “Test” button allows you to check the correctness of the entered password if you are connecting to a remote folder that has already been set up (e.g. if you are accessing a previously set up folder from a different device or if you have decided to share files among a group of people).

The “Empty Sync Folder” clears the remote folder from any files and prepares it for encrypted synchronization operations.

encrypt2

After you hit the “Save” button at the bottom of the window, your GoodSync job will be ready.

Add some files that you want to deliver to the cloud side in encrypted form to the left (Local) folder.

encrypt3

Hit “Analyze” button. You will see that there are some new files on your left (Local) side.

Hit “Sync” button. You will see that some files with garbled names appeared on your right (Remote) side.

encrypt4

You may also notice that if you are not using one of the compressed file formats (e.g., late Microsoft Office, PDF, JPG), your encrypted file is also smaller in size. It happens because GoodSync is also trying to compress the file before encryption.

This is how easy, literally in three steps, you can convert any popular cloud file storage (if it is supported by GoodSync) into an encrypted and compressed storage. You receive the double benefit of compression by enforcing the privacy of your data and saving on storage space.

If you are interested in the details of encryption implementation, please visit the GoodSync technical manual: https://www.goodsync.com/manual#side_tab

You can learn more about business and personal GoodSync solutions on our website: https://www.goodsync.com/

All GoodSync products are available for free trial before purchase: https://www.goodsync.com/download

 

Sources:

[1] https://www.statista.com/statistics/499558/worldwide-personal-cloud-storage-users/

[2] https://ec.europa.eu/eurostat/statistics-explained/index.php/Internet_and_cloud_services_-_statistics_on_the_use_by_individuals

[3] https://www.statista.com/statistics/250191/consumer-concerns-about-cloud-services/

[4] http://theconversation.com/how-secure-is-your-data-when-its-stored-in-the-cloud-90000

Data BackupFor Business

Full and Incremental Backup with GoodSync

There are three basic backup types: full, differential, and incremental.

Full Backup creates a copy of all files as they were at the time of the backup.

Differential Backup creates a copy that contains only those files that have been altered since the last full backup.

Incremental Backup creates a copy that contains only those files that have been altered since the last backup, incremental or full.

This article will describe how to implement a daily Incremental Backup with a periodic weekly Full Backup using GoodSync. You can easily implement backups with different frequencies, using information found within this article.

If you do not currently own a GoodSync license,  download the free 30-day fully-functional trial.

We will use four GoodSync features:

  • on-file-change automatic synchronization option
  • periodic automatic synchronization option
  • time-based parametrization in folder paths
  • ability to create destination folders that do not exist

You can read more about these subjects in the GoodSync Manual:

https://www.goodsync.com/manual#auto_tab

https://www.goodsync.com/manual#environment_variables

Step 1: Setting up paths

Source folder: set your left path to be the source folder you want to back up. This approach only works when your source folder is local. This requirement is needed due to the fact that file monitoring only reliably works on a computer’s local drives.

Destination folder: add time-based parameters to the right path to set up the destination folder.

GoodSync supports the following variables:

%YYYY% — current year.

%MM% — current month, from 01 to 12.

%DD% — current day of the month, from 01 to 31.

%DOW% — current day of the week, from 0 to 6.

%WOM% — current week of the month, from 1 to 4.

%HH% — current hour, from 00 to 23.

%II% — current minute, from 00 to 59.

For example, a destination path can be set to:

C:\Backup Destination Directory\Backup %YYYY%-%MM%-%DD%\

Each time GoodSync runs on a new day, it will create a new directory (ensure the “Create Folder if Does Not Exist” option is ON) with the full date. For example, on February 7, 2018 full back will be performed to this directory:

C:\Backup Destination Directory\Full Backup 2018-02-07\

The destination folder can exist on any of the file systems supported by GoodSync:

https://www.goodsync.com/manual#file-systems

Step 2: Setting up automation

Right click on the job you are editing, select the “Options” menu item.

In the Options window, select the “Auto” menu item.

In the auto section, check “On File Change“ and “On Schedule” checkboxes.

GSbackup1

Click the “Configure…” button to select the scheduling details:

GSbackup2

Click the “Configure…” button and select the desired schedule, e.g., on Sundays:

GSbackup3

This particular setting will force GoodSync to perform a full backup once a week on Sundays

What to expect

After you enter all these settings and save the Auto settings, the following will happen:

GoodSync will create a subfolder at a destination folder with today’s date.

GoodSync will perform a full back of the source folder into the destination folder.

After the full backup is finished, GoodSync will start monitoring the source folder for changes and sending copies of all changed / newly created files to the destination folder.

The following day, GoodSync will create a new folder with the new day’s date and will send all changed / newly created file on that date to that new folder.

When Sunday comes, GoodSync will continue monitoring and propagating changes, but at some point will also make a full copy of the source folder to the destination folder.

This process will continue daily.

A data purging process can be performed via scripting. Scripts can either be run on schedule independently or executed as a post-synchronization script for GoodSync.

You can read more about GoodSync built-in scripting here: https://www.goodsync.com/manual#scripts_tab

 

 

 

For BusinessGeneral

GoodSync GDPR Compliance Statement

Introduction

In 2016, the EU adopted General Data Protection Regulation (“GDPR”). The GDPR is now recognized as law across the EU. GDPR enforcement begins on 25th May 2018.

Our Commitment

Siber Systems Inc. (‘we’ or ‘us’ or ‘our’) are committed to ensuring the security and protection of the personal information that we process, and to provide a compliant and consistent approach to data protection. We have always had a robust and effective data protection program in place which complies with existing law and abides by the data protection principles. However, we recognize our obligations in continuously updating and expanding this program to keep meet the demands of the GDPR.

Siber Systems Inc. are dedicated to safeguarding the personal information under our remit and in developing a data protection regime that is effective, fit for purpose and demonstrates an understanding of, and appreciation for the new Regulation. Our preparation and details of GDPR compliance have been summarised in this statement and include the development and implementation of data protection roles, policies, procedures, controls and measures to ensure maximum and ongoing compliance.

How We Have Prepared for the GDPR

Siber Systems Inc. has a consistent level of data protection and security across our organization, that fully complies with all DGPR provisions.

Our preparations included:

  • Completed Information Audit – we have identified that we DO NOT store any sensitive personal data as it is defined by GDPR. We only store non-sensitive personal data that is required to conduct business. We have identified what personal information we hold, where it comes from, how and why it is processed and if and to whom it is disclosed, as well as GDPR compliance of downstream data processors.
  • Revised Policies & Procedures – we have revised our data protection policies and procedures to meet the requirements and standards of the GDPR and any relevant data protection laws, including:
    • Data Protection – our main policy and procedure document for data protection has been overhauled to meet the standards and requirements of the GDPR. Accountability and governance measures are in place to ensure that we understand and adequately disseminate and evidence our obligations and responsibilities; with a dedicated focus on privacy by design and the rights of individuals.
    • Data Retention & Erasure – we have updated our retention policy and schedule to ensure that we meet the ‘data minimization’ and ‘storage limitation’ principles and that personal information is stored, archived and destroyed compliantly and ethically. We have procedures in place to meet the ‘Right to Access’ (Article 15), ‘Right to Rectification’ (Article 16), ‘Right to Erasure’ (Article 17) obligation and are aware of when this and other data subject’s rights apply; along with any exemptions, response timeframes and notification responsibilities.
    • Data Breaches – our breach procedures ensure that we have safeguards and measures in place to identify, assess, investigate and report any personal data breach at the earliest possible time. Our procedures are robust and have been disseminated to all employees, making them aware of the reporting lines and steps to follow.
    • International Data Transfers & Third-Party Disclosures – where Siber Systems Inc. collects, transfers and stores on US servers ONLY personal information needed for execution of the contract between the client and the Company. We have robust procedures and safeguarding measures in place to secure, encrypt and maintain the integrity of the data. Our procedures include a continual review of the countries with sufficient adequacy decisions, as well as provisions for binding corporate rules; standard data protection clauses or approved codes of conduct for those countries without. We carry out strict due diligence checks with all recipients of personal data to assess and verify that they have appropriate safeguards in place to protect the information, ensure enforceable data subject rights and have effective legal remedies for data subjects where applicable.
  • Legal Basis for Processing – our processing activities are in compliance with the Article 6.
  • Records of Processing Activities – Siber Systems Inc. is excluded from the obligation to maintain records of our processing activities, under Article 30 due to size and nature of data conditions.
  • Privacy Notice/Policy – our Privacy Policies (separate for each product family) comply with the GDPR.
  • Data Protection Impact Assessments (DPIA) – we neither process sensitive personal information nor perform large-scale processing of non-sensitive personal information. We have developed stringent procedures and assessment templates for carrying out impact assessments that comply fully with the GDPR’s Article 35 requirements. We have implemented documentation processes that record each assessment, allow us to rate the risk posed by the processing activity and implement mitigating measures to reduce the risk posed to the data subject(s).
  • Processor Agreements – where we use any third-party to process personal information on our behalf (i.e. Payment Processing), we have ensured that Processor Agreements and due diligence procedures are in place for ensuring that they (as well as we), meet and understand their/our GDPR obligations. These measures include initial and ongoing reviews of the service provided, the necessity of the processing activity, the technical and organizational measures in place and compliance with the GDPR.
  • Special Categories Data – we have identified that we do not process any of the special categories of the personal data.

Data Subject Rights

In addition to the policies and procedures mentioned above that ensure individuals can enforce their data protection rights, we provide easy to access information via email gdpr@siber.com of an individual’s right to access any personal information that Siber Systems Inc. processes about them and to request information about:

  • What personal data we hold about them
  • The purposes of the processing
  • The categories of personal data concerned
  • The recipients to whom the personal data has/will be disclosed
  • For how long we intend to store your personal data
  • If we did not collect the data directly from them, information about the source
  • The right to have incomplete or inaccurate data about them corrected or completed and the process for requesting this
  • The right to request erasure of personal data (where applicable) or to restrict processing in accordance with data protection laws, as well as to object to any direct marketing from us and to be informed about any automated decision-making that we use
  • The right to lodge a complaint or seek judicial remedy and who to contact in such instances

Information Security & Technical and Organizational Measures

Siber Systems Inc. takes the privacy and security of individuals and their personal information very seriously and takes every reasonable measure and precaution to protect and secure the personal data that we process. We have robust information security policies and procedures in place to protect personal information from unauthorized access, alteration, disclosure or destruction and have several layers of security measures, including employee training, data encryption in transit, data encryption in storage, password policy, one-time-password and two-factor authentication mechanisms, as well as other technical and organizational prevention, detective, and correction controls.

GDPR Roles and Employees

Siber Systems Inc. have appointed a data privacy team to constantly monitor compliance with the GDPR legislation. The team are responsible for promoting awareness of the GDPR across the organization, assessing our GDPR readiness, identifying any potential gap areas and implementing the new policies, procedures and corrective measures.

Siber Systems Inc. understands that continuous employee awareness and understanding is vital to the continued compliance of the GDPR and have involved our employees in our preparation plans. We have implemented an employee training program specific to the which have been provided to all employees, and forms part of our induction and annual training program.

If you have any questions or requests related to GDPR, please contact our GDPR compliance team via email gdpr@siber.com.

For BusinessGeneral

GoodSync GDPR Compliance Progress Statement

Introduction

In 2016, the EU adopted General Data Protection Regulation (“GDPR”). The GDPR is now recognized as law across the EU. GDPR enforcement begins on 25th May 2018.

Our Commitment

Siber Systems Inc. (‘we’ or ‘us’ or ‘our’) are committed to ensuring the security and protection of the personal information that we process, and to provide a compliant and consistent approach to data protection. We have always had a robust and effective data protection program in place which complies with existing law and abides by the data protection principles. However, we recognize our obligations in updating and expanding both personal and business product lines of our GoodSync product family, related technical services and supporting programs (e.g., payment processing/license management and online technical support portal) to meet the demands of the GDPR.

GDPR Compliance Completion Checklist

We have identified that the only technical item remaining to be implemented for full compliance with GDPR is the gathering of the consent from European users prior to collecting, transferring and storing their data on a server in the United States of America. We are committed to being in full compliance with GDPR by the May 25 deadline.

Information Audit

We have identified that we DO NOT store any sensitive personal data as it is defined by GDPR. We only store the minimum of non-sensitive personal data that is required to conduct business (e.g., perform sufficient authentication within the product or to process a payment).

We have identified what personal information we hold, where it comes from, how and why it is processed and if and to whom it is disclosed, as well as GDPR compliance of downstream data processors.

How We are Preparing for the GDPR

Siber Systems Inc. already have a consistent level of data protection and security across our organization, however it is our aim to be fully compliant with the GDPR by 25th May 2018. Our preparations include but are not limited to:

  • Revising policies & procedures
  • Training employees
  • Revising of privacy polices
  • Obtaining user consent in DGPR-compliance manner
  • Revising direct marketing procedures
  • Performing data protection impact assessments for each of the products and services
  • Obtaining Processor Agreements with downstream processors (e. Payment Processing)
  • Assuring rights of data subjects to obtain a copy of personal data, to correct that data and to request deletion of certain types of data.
  • Introduction of GDPR-specific e-mail contact address: gdpr@siber.com

Please contact us if you have any questions or concerns about the rights of you or your employees. You can respond to this email or contact us at gdpr@siber.com .