Security is one of the prevailing headline topics that has dominated news feeds throughout this year. Whether this has been in reference to the various security breaches that have occurred throughout the year or in reference to what companies are doing to protect data, improve security and keep your information safe. Following on from the latter of these two news avenues, Google has sent out a post on their Drive blog detailing that they too, are keen for you to know that they are doing all they can to keep the customer data that they have access to, safe.
The blog is in reference to the research grant program the company already has in use to protect Google Drive. For those unfamiliar with this, the research grant program is a program which was set up and designed to allow independent security research teams to contribute to help ensure Drive remains safe. As Google puts it, although they use "highly-secure, custom-built data centers to store your photos, videos, and other documents" and keep them safe, "It's the software engineers and 500+ security experts at Google, along with a network of independent researchers, who live and breathe data security".
The update today on the program, is that Google are planning to invest an additional one million dollars into the program throughout next year, to help further fund future security research and protect Drive. This is in addition to the $20,000 bounty that Google also offers independently to anyone who finds and reports any security issues, flaws or prone-to-breach elements that their system has. As such, it does seem that Google does want the public to rest assured that they are doing what they can to help keep private data, private, regardless of whether this is at the software level or in terms of the physical way in which data is storaged. Speaking of which, if you would like to see what a Google data center looks like and where all your data is locally stored, then you can check out the video below which Google also released and linked to in the blog. Alternatively, head through the source link below to read the blog post in full.