Story image

Google rolls out phishing prevention amongst new G Suite security features

26 Mar 2018

Google’s G Suite Platform has received a facelift, with the rollout of 20 new updates including phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and additions to its security centre.

G Suite is Google’s collection of cloud-based services for business. They include Gmail, Docs, Drive, and Calendar, amongst others.

In a blog post last week the company explained that while security tools are good at stopping threats at scale, ultimately user adoption relies on ease of use. This, Google says, is why it aims to provide simpler ways for IT admins to manage access, control devices, ensure compliance, and keep data secure.

The new rollouts, most of which will be turned on by default, firstly include anti-phishing prevention through machine learning models. These models will look for threat indicators.

Google says that its updated phishing protection will be able to catch 99.9% of Business Email Compromise (BEC) scams and either send them to the spam folder or flag them with anomaly warnings.

Phishing prevention will also be able to:

  • “Automatically flag emails from untrusted senders that have encrypted attachments or embedded scripts.
  • Warn against email that tries to spoof employee names or that comes from a domain that looks similar to your own domain.
  • Offer enhanced protections against spear phishing attacks by flagging unauthenticated email.
  • Scan images for phishing indicators and expand shortened URLs to uncover malicious links.”

Google has also improved G Suite’s enterprise-grade mobile management solution to make basic mobile device management automatically enabled. Administrators can see which devices are accessing corporate data; they can enforce pass codes and erase confidential data; and they can automatically protect Android and iOS devices.

G Suite admins will also be able to restrict users’ two-step verification methods to security keys only. Google says it recommends security keys over other forms of authentication because they are easy to use and prevent common attacks such as phishing.

Admins will also be able to add and revoke security keys; and view reports on security key usage.

Google has also implemented ‘Information Rights Management’ (IRM) controls for Team Drives to ensure documents are protected.

  • Admins can now limit file access privileges to Team Drives members, or only to users within your domain.
  • Admins can also add IRM controls to prevent users from printing, downloading and copying files within Team Drives. 

Finally, Google says it is offering better security visibility for G Suite admins. Earlier this year the company added its ‘security center’, a tool that unifies security analytics, insights and best practice recommendations.

New additions include:

  • New security charts to show OAuth activity and Business Email Compromise (BEC) scam threats that are specifically focused on phishing emails that may not have links.
  • New mobile management charts to help IT admins examine activity analytics and show when devices have been hijacked, rooted or jailbroken, as well as when other suspicious device activity has been detected.
  • Ways to reorganise the dashboard to focus on what is most important to an organisation.
  • Ways to analyse an organisation’s security health and get custom advice on security key deployment and protection against phishing scams.
NVIDIA announces Jetson Nano: A US$99 tiny, yet mighty AI computer 
“Jetson Nano makes AI more accessible to everyone, and is supported by the same underlying architecture and software that powers the world's supercomputers.”
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
NVIDIA introduces a new breed of high-performance workstations
“Data science is one of the fastest growing fields of computer science and impacts every industry."
Apple says its new iMacs are "pretty freaking powerful"
The company has chosen the tagline “Pretty. Freaking powerful” as the tagline – and it’s not too hard to see why.
NZ ISPs issue open letter to social media giants to discuss censorship
Content sharing platforms have a duty of care to proactively monitor for harmful content, act expeditiously to remove content which is flagged to them as illegal.
Partnership brings AI maths tutor to NZ schools
“AMY can understand why students make a mistake, and then teach them what they need straight away so they don't get stuck."
Polycom & Plantronics rebrand to Poly, a new UC powerhouse
The name change comes after last year’s Plantronics acquisition of Polycom, a deal that was worth US $2 billion.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.