• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
FacebookTwitterLinkedInInstagramYoutube
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Trends
  • Home
  • / ...
  • /Tech News
  • /Trends

Cybersecurity: Useful Steps to Use OneDrive with Microsoft 365 Desktop

By Vincent David on
September 12, 2021

If we talk about public cloud storage services, Microsoft's OneDrive is one of the most well-known cloud services in the industry. However, countless individuals enjoy accessing the OneDrive but are unaware of it or are unsure how to utilize it. This article will discuss what OneDrive is, how to obtain it, and how to use it.

What is OneDrive?

This application is a cloud storage service that anybody with a Microsoft account can utilize. Any other cloud storage service, like Google Drive and Dropbox, lets you save things. Moreover, it includes files, images, and online videos. Also, it allows the user to access them from every device—not only your desktop or mobile—as long as you have an internet connection.

Furthermore, it has numerous advantages. One advantage is that you may save storage on your primary laptop, PC, smartphone, or iPad by offloading certain things to the cloud. You can also use it for files, images, and videos that you do not have to view regularly. In particular, media can take up a lot of storage space, so using cloud storage is a good idea.


Want more tech news? Subscribe to ComputingEdge Newsletter Today!


Useful Steps to use OneDrive with Microsoft 365 desktop

Learn how users can use Microsoft OneDrive and how it may help them collaborate more effectively. Understand how users can save, sync, and securely operate on files throughout entire devices with OneDrive in Microsoft 365.

Do Not Use Administrative Privileges.

Most malware operates with similar privileges as the active user when it is started—whether by a user unintentionally or automatically. It implies that by restricting privileges on your account, users can keep malware from causing harm to their devices.

By default, Windows utilizes User Account Control (UAC) to offer automated, detailed privilege control. It temporarily limits privileges and informs the active user whenever a program tries to make possible harmful modifications to the system. However, although UAC assists in restricting administrator users' powers, users can bypass this limitation when prompted. As an outcome to unintentionally enable malware to execute, it is slightly simple for an administrator user.

Hence, it is advised to use a non-admin account. This is for your frequent use to avoid malware infestation and other possibly disastrous modifications. You can avoid installing illegal programs and unintentionally modify system settings by utilizing a non-admin account. Also, do not keep using the accounts with admin privileges to browse the internet or read emails.

Furthermore, log in as an administrator when installing programs or performing configurations that need administrator privileges.

Raise The Level of Protection Against Malware in The Mail.

The Microsoft 365 set comes with malware security, but you may boost it by restricting attachments with file formats that are sometimes used for viruses. Watch a brief training clip or follow the steps below to improve protection against malware in the email:

  1. Log in with your administrator account credentials at https://protection.office.com.
  2. Select Policy > Anti-Malware in the Security & Compliance Center's left navigation pane, below Threat management.
  3. Double-click the default policy to modify this company-wide policy.
  4. Click Settings.
  5. Select On for the Common Attachment Types Filter. In the window right below this control, the file types that are blocked are enumerated. If needed, you can add or remove file types after.
  6. Click Save.

Use Dedicated Admin Accounts.

Admin accounts with higher privileges are used to manage your Microsoft 365 environment. For cyber thieves, and hackers these are important targets. You can only use administrator accounts for administrative purposes. Administrators should have a non-admin user account and use the administrative account to accomplish tasks related to their job function. Other suggestions include:

  • For administrator accounts, ensure that you enable multi-factor authentication.
  • Terminate any associated browsing activities and applications, including personal email accounts, before utilizing administrator accounts.
  • Make sure to sign out from the browsing sessions once you've finished with administrative activities.

OneDrive Encryption

You should activate encryption on your smartphones. If you are using OneDrive mobile application, it is recommended that you must activate encryption on iOS or Android gadgets. If your mobile phone is lost, taken, or if someone obtains accessibility to it, this maintains your OneDrive data safe.

Furthermore, even if you have synced your data using other sync software, such as the Itrezzo app, you can guarantee that all of your data will be safe as long as you have activated your encryption.

Disk-level File Encryption for Data Stored on Microsoft Server

All client information in Microsoft's internet service is encrypted in one and some way. At the volume level, Microsoft servers employ BitLocker to secure disk drives storing client material. The encryption of BitLocker is protecting every client's information. Those are if other procedures or controls like access control will fail, allowing illegal accessibility to disks carrying client content.

Furthermore, Microsoft internet service secures client information using Service Encryption at the apps layer to volume-level encryption. Over the top of robust encryption security, Service Encryption includes protection on rights and management solutions. It also provides the separation of Windows OS and the client data stored that such operating systems processed.

Use A Cloud Backup Solution.

Cloud backup is a system that stores data to cloud storage. However, it has other features as well. Cloud backup solution service will copy the data automatically to a storage location. It will also recover your data fast after a disaster occurs.

Moreover, you can also look for particular files and recover different versions of a backed-up file. Also, secure the information from most common dangers, like accidentally deleting brute-force attempts and malware.

Personal Vault

OneDrive Personal Vault is a secure location in OneDrive that requires strong authentication or the 2nd layer of proof of identification like the fingerprints, facial, PIN, or a key provided to you through email or Text. Personal Vault adds an extra degree of protection to protected files, making it safer if someone obtains accessibility to the account or devices. Personal Vault is accessible via your Computer, OneDrive.com, the OneDrive mobile applications, and offers the following attributes:

  • Scan straight to Personal Vault - Using the OneDrive mobile application, anyone can capture photos or record videos right in the Personal Vault, making them from the less secure places of the devices like the camera roll. You can always scan crucial trips, identities, automobiles, houses, and insurance papers and save them straight to the Personal Vault. So, you can view every image, file, and other documents wherever you go with those devices.
  • Personal Vault relocks after a brief time of inactivity on your computer, tablet, or internet. All documents you were working with will be restricted as well, and accessing will need re-authentication.

Conclusion

Cybersecurity is crucial because it protects all sorts of data from theft and loss. This classification includes sensitive data, personal information, confidential health info, documents, governmental and corporate network safety, and other private information.

Without a cybersecurity program, your organization will be unable to defend itself from cyber-attack activities, making it a convenient target for cybercriminals like hackers and thieves.

LATEST NEWS
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families
From Legacy to Cloud-Native: Engineering for Reliability at Scale
From Legacy to Cloud-Native: Engineering for Reliability at Scale
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025
IEEE Computer Society Announces 2026 Class of Fellows
IEEE Computer Society Announces 2026 Class of Fellows
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

Quantum Insider Session Series: Practical Instructions for Building Your Organization’s Quantum Team

Beyond Benchmarks: How Ecosystems Now Define Leading LLM Families

From Legacy to Cloud-Native: Engineering for Reliability at Scale

Announcing the Recipients of Computing's Top 30 Early Career Professionals for 2025

IEEE Computer Society Announces 2026 Class of Fellows

MicroLED Photonic Interconnects for AI Servers

Vishkin Receives 2026 IEEE Computer Society Charles Babbage Award

Empowering Communities Through Digital Literacy: Impact Across Lebanon