Category: G Suite Security

Articles about Ransomware and malware protection, data security and data leak prevention.

Avoid Google File Synchronization Threats with Spinbackup

Avoid-Google-File-Synchronization-Threats-with-Spinbackup

Twenty years ago, if you were to mention “cloud computing” no one would have known what you were referring to. However, today in modern IT infrastructure, most enterprises are focused on placing more resources in public cloud datacenters than ever before. Aside from enterprise environments, individuals most likely are making personal use of cloud storage. What kinds of resources and services are served out from the cloud? Anything from email, applications, and all the way down to general file storage. Moving resources to the public cloud has allowed individuals and enterprises alike to be more agile, versatile, and access data anywhere.

Read more

G Suite Security: Insider Threat Control with Spinbackup DLP

insider threat control dlp for g suite security

Often in the world of cyber security, many IT administrators focus on outside threats that exist on the perimeter of the datacenter. The risks presented to organizations from outside threats is very real, whether in the form of an attacker, or a malicious bit of code trying to infiltrate vital systems. However, it is often the case that dangerous insider threats come from within the internal networks used by organizations for business-critical functions. Insider-threats are very real and need to be addressed accordingly.

Read more

G Suite Security. Best Practices for Sensitive Data Protection

sensitive data protection

On July 29, 2017, arguably the most shocking breach of PII (personally identifiable information) was discovered by Equifax. Over 143 million people and their most sensitive data were exposed by attackers. This was the holy grail of sensitive data leakage as it contained all the personal information for each individual in one place – name, age, address, social security number, etc. It underscores in a large way how much we value protecting sensitive data especially when it relates to our personal information. Of tremendous importance for G Suite administrators thinking about securing G Suite environments is moderating and controlling sensitive data in the G Suite environment to prevent data leaks.

Read more

G Suite Security. Best Practices for Risky Apps Control

g suite security for risky apps

One of the powerful features of public cloud environments such as Google G Suite is the ability to take advantage of the huge ecosystem of third-party apps available. The third-party apps found in the G Suite marketplace offer a wide range of quality, enterprise focused apps that add functionality and features to the native G Suite environment. These can include many useful applications to organizations such as CRM apps, Project management apps, and Admin tools. These are easily accessed from the G Suite environment with a Google account. While third-party apps offer tremendous business value to a G Suite organization, they also present an inherent danger to the overall security stance of a G Suite environment.

Read more

G Suite Security. Best Practices for Data Leak Prevention

G Suite Security Data Leak Prevention

As we discussed in the previous post, G Suite administrators have to take security concerns very seriously, especially when it comes to keeping their organizational data secure. This involves two aspects: Data Loss prevention and Data Leak prevention. As we discussed previously, data loss can be the result of accidental deletion, such as when an employee may inadvertently delete files. However, even more alarming is data loss as the result of intentional means, such as targeted ransomware attacks.

Read more

Data Loss Prevention (DLP) for G Suite

data loss prevention (DLP) for G Suite

Organizations today who already have a presence in the public cloud, or that look to have a public cloud presence in the near future, have to take G Suite security very seriously. Today’s modern businesses with digital resources have to be concerned with data security that exists not only on premise, but in the public cloud. G Suite administrators need to follow certain security best practices to ensure that the data and identity resources living in the public cloud are secure.

Read more

Spinbackup Releases G Suite Security Policies

spinbackup_security_policies

Organizations moving to the public cloud are faced with serious challenges to security and security related processes. Generally speaking, organizations maintaining on-premise infrastructure have total control over security and policies related to securing access to data, data loss prevention, and data security. When moving to the public cloud however, how can organizations provide this same, or even superior, level of data protection, data leak prevention, and data security?

Read more

Essentials for Cloud Access and Security Management Success

Cloud Access and Security Management
A crucial part of cloud security involves managing user identities, their permissions, and resources they have access to.  This can be an extremely challenging task for organizations who may have users accessing public cloud resources from a number of different devices and networks. Additionally, organizations may be utilizing multiple clouds and managing access across all of those public clouds. Most public cloud vendors today provide cloud Identity and Access Management (IAM) frameworks to help facilitate and secure users’ identities and access to resources.

Read more