G Suite Security Best Practices for Data Leak Prevention

g suite security best practices data leak prevention

As we discussed in the previous post, G Suite administrators have to take security concerns very seriously, especially when it comes to keeping their organizational data secure. This involves two aspects: Data Loss prevention and Data Leak prevention. As we discussed previously, data loss can be the result of accidental deletion, such as when an employee may inadvertently delete files. However, even more alarming is data loss as the result of intentional means, such as targeted ransomware attacks.

Read more

G Suite Security Best Practices: Data Loss Prevention (DLP)

data loss prevention (DLP) for G Suite

Organizations today who already have a presence in the public cloud, or that look to have a public cloud presence in the near future, have to take G Suite security very seriously. Today’s modern businesses with digital resources have to be concerned with data security that exists not only on premise, but in the public cloud. G Suite administrators need to follow certain security best practices to ensure that the data and identity resources living in the public cloud are secure.

Read more

G Suite for Education Backup and Security

G Suite for Education Backup and Security
G Suite for Education backup and security should be taken seriously as GSFE (formerly known as Google Apps for Education) puts creative, nimble, and flexible learning at the center of the educational experience.

The global higher education system has expanded over the last 15 years in traditional and new markets. The ideas of equity, responsiveness, diversity, and institutional accessibility lie at the heart of this transformation process.

Read more

Office 365 Security Concerns

Microsoft has come a long way in providing security for Office 365 customers looking to bolster office 365 security.

Microsoft Office 365 is one of the most powerful business productivity suites housed in the public cloud today. Many businesses today are either already running business-critical services and applications in Microsoft’s Office 365 environment or they are considering the move from on-prem to public cloud by way of Office 365. Office 365 certainly touts some really great benefits for organizations looking to move to the public cloud. As with any technology solution used for business today, it must be scrutinized for any potential security risks.

Read more

G Suite Security. Best Practices for Sensitive Data Protection

sensitive data protection

On July 29, 2017, arguably the most shocking breach of PII (personally identifiable information) was discovered by Equifax. Over 143 million people and their most sensitive data were exposed by attackers. This was the holy grail of sensitive data leakage as it contained all the personal information for each individual in one place – name, age, address, social security number, etc. It underscores in a large way how much we value protecting sensitive data especially when it relates to our personal information. Of tremendous importance for G Suite administrators thinking about securing G Suite environments is moderating and controlling sensitive data in the G Suite environment to prevent data leaks.

Read more

Migrating from On Premise to Microsoft Office 365

Migrating from On Premise to Microsoft Office 365

Cloud Migration Guide. Part I

Businesses moving to the public cloud today look for powerful solutions that allow them to be more mobile, agile, and technology progressive than keeping infrastructure only in on-premise datacenters. There are certainly many options available to organizations today. Organizations comparing different public cloud vendors have to consider and weigh out the services offered as well as the cost for those services as one cloud provider may align more closely to the business needs and objectives than another cloud provider.

Read more

G Suite Security: Top 5 Risks to Avoid

g-suite-security-risks

G Suite has revolutionized the way we work for many individuals and organizations. Let’s take a deep dive into G Suite security best practices to safeguard your corporate data. Gone are the days of accidentally saving over an existing file by mistake, losing hours of work because you forgot to save your document, or emailing files back and forwards between colleagues.

Google provides a full suite of tools for word processing, working with spreadsheets, creating websites, and communicating and collaborating with others. All data is saved to the cloud in real-time so you don’t have to worry about losing your work by accident and earlier versions of files are available too. You need to implement extensive G Suite security policies within your organisation to ensure security and compliance requirements are duly met/

Read more

How to Prevent CA Security Breaches

Compromised CA Certificate Attacks

Certificate authentication plays a major role in securing online resources, and most organizations utilize certificates to secure communication between both hosted resources and those that are accessed. It is a more secure way of authenticating users compared to the legacy username and password mechanism. Certificate authentication uses asymmetric cryptography, meaning that it is able to separate out 1) those who can verify the link between the physical identity and the cryptographic public key and 2) Those who can authenticate the user. However, user certificates are only as good as the Certificate Authorities, or CAs, that identify them. Attackers have certainly targeted the CAs as a means to issue unauthorized certificates or impersonate certificates for authentication. Let’s take a look at compromised CA Certificate attacks and their impacts.

Read more