flagged
Data & Privacy25 June 2025 · 6 min read

Cloud Storage Security for Business: How to Use Google Drive, OneDrive and Dropbox Safely

Avoid common cloud storage mistakes and learn the key controls that keep your Australian small business files secure in Google Drive, OneDrive, and Dropbox.


Google Drive, OneDrive, and Dropbox have transformed how Australian small businesses store and share files. They're convenient, accessible from anywhere, and far more reliable than a hard drive under someone's desk. But "cloud" doesn't mean "secure by default." How you configure and use these tools matters enormously.

Cloud Storage Is Safer Than Local Storage — But Not Risk-Free

Major cloud storage providers invest heavily in physical security, encryption, and infrastructure redundancy that no small business could replicate on its own. Your files in Google Drive are encrypted at rest and in transit, stored across multiple data centres, and backed by security teams that work around the clock. In that sense, the cloud is genuinely safer than a file server in your back office.

But the risks haven't disappeared — they've just changed shape. The biggest threats to cloud-stored data aren't provider breaches; they're mistakes made by the businesses using them.

Common Cloud Storage Mistakes That Create Real Risk

  • Oversharing publicly. Google Drive and Dropbox make it easy to generate a link that "anyone with the link" can access. These links are often shared in emails, posted in documents, or sent to clients — and then forgotten. Sensitive files left on public links can be found by search engines or stumbled upon by anyone the link is forwarded to.
  • Weak account credentials. If your Google or Microsoft account has a weak password and no MFA, your cloud storage is only as secure as that password. Account compromise gives an attacker full access to everything you've stored.
  • Not revoking ex-employee access. A staff member who leaves still has access to every shared folder they were a member of until someone removes them. This is one of the most common and easily prevented security failures in small businesses.
  • Syncing ransomware to the cloud. If ransomware encrypts files in your local sync folder (the OneDrive or Dropbox folder on your desktop), those encrypted files are pushed to the cloud and overwrite the good copies.

Key Controls to Implement Now

Enable MFA on Every Cloud Account

Multi-factor authentication (MFA) is the single most effective control for cloud account security. Even if a password is stolen or guessed, MFA prevents login without the second factor. Enable it on every account that has access to business files — Google, Microsoft, Dropbox, and any other cloud service your team uses.

Review Sharing Settings Regularly

Set a calendar reminder to review your cloud sharing settings quarterly. Look for files or folders shared with "anyone with the link" and change them to specific people only. Remove sharing with individuals who no longer need access. Both Google Drive and OneDrive have admin tools to see all externally shared content at once.

Offboard Staff Immediately

When a staff member leaves, remove their access to cloud storage on their last day — not next week when someone gets around to it. If they have a company email account (Google Workspace or Microsoft 365), disabling the account removes their access to all associated services at once, making this easier to manage consistently.

Use Version History as a Ransomware Defence

Google Drive, OneDrive, and Dropbox all maintain previous versions of files. If ransomware encrypts your cloud-synced files, version history lets you restore the pre-encryption versions. Check that version history is enabled on your account and understand how far back it goes — some plans only keep 30 days of history, while others offer longer retention.

Encrypt Truly Sensitive Files Before Upload

For highly sensitive files — legal documents, financial records, client health data — consider encrypting them before uploading to cloud storage. Tools like 7-Zip (free) allow you to create password-protected, encrypted archives. This means even if someone gains unauthorised access to your cloud storage, they cannot read the file without the encryption password.

Understanding the Shared Responsibility Model

Cloud providers like Google and Microsoft are responsible for securing the infrastructure — the data centres, the network, the encryption systems. You are responsible for how you use the platform — who has access, what is shared publicly, whether MFA is enabled, and what happens when staff leave.

This is called the shared responsibility model, and it's important to understand because many small businesses assume that because Google or Microsoft is running the service, security is taken care of. The provider secures the platform. You secure your data on that platform. Both halves need to work.

The good news is that the controls required on your side are not complicated. MFA, sensible sharing practices, prompt offboarding, and regular access reviews cover the majority of real-world risk. Build these into your routine and cloud storage genuinely becomes a safe and practical tool for your business.

Free tool

Know your cyber risk in 15 minutes

50 plain-English questions. Prioritised recommendations. Free PDF report. No sign-up.

Start free assessment →

Frequently asked questions

Is Google Drive or OneDrive safe for storing sensitive business documents?

Both Google Drive and OneDrive are built on enterprise-grade infrastructure with strong encryption in transit and at rest, and both are used by large organisations including government agencies around the world. For most small business documents — contracts, invoices, client files — they are a safe and practical choice, provided your account is properly secured with MFA and you manage sharing settings carefully. For highly sensitive data such as health records, legal privileged documents, or information subject to specific regulatory requirements, you should check whether the storage location (including which country data is stored in) meets your compliance obligations.

Can ransomware spread to my cloud storage?

Yes — ransomware can encrypt files stored in cloud sync folders (like the OneDrive or Dropbox folder on your desktop), and those encrypted versions are then synced to the cloud, overwriting the good copies. This is why relying on cloud storage alone is not a complete backup strategy. The good news is that most cloud storage services maintain version history, allowing you to restore previous versions of files before they were encrypted. Make sure version history is enabled on your account and that the retention period is long enough to cover a scenario where the ransomware isn't discovered for several days.

What should I do when a staff member leaves to protect shared files?

Offboarding a staff member from cloud storage should happen on their last day — ideally before they leave the office. Revoke their access to all shared drives, folders, and team workspaces. If they used a company account (like a Google Workspace or Microsoft 365 account) transfer ownership of any files they owned to another user before disabling the account — otherwise files owned by the deleted account may become inaccessible. After access is revoked, do a brief audit of what they had access to and check whether any sensitive files were downloaded or shared externally in their final days. A clear offboarding checklist that includes cloud storage access makes this process reliable rather than ad hoc.

Tags

cloud storageGoogle DriveOneDrivedata securityshared responsibility