Story image

Google rolls out phishing prevention amongst new G Suite security features

26 Mar 18

Google’s G Suite Platform has received a facelift, with the rollout of 20 new updates including phishing prevention, mobile device management, security keys for two-factor authentication, Information Rights Management, and additions to its security centre.

G Suite is Google’s collection of cloud-based services for business. They include Gmail, Docs, Drive, and Calendar, amongst others.

In a blog post last week the company explained that while security tools are good at stopping threats at scale, ultimately user adoption relies on ease of use. This, Google says, is why it aims to provide simpler ways for IT admins to manage access, control devices, ensure compliance, and keep data secure.

The new rollouts, most of which will be turned on by default, firstly include anti-phishing prevention through machine learning models. These models will look for threat indicators.

Google says that its updated phishing protection will be able to catch 99.9% of Business Email Compromise (BEC) scams and either send them to the spam folder or flag them with anomaly warnings.

Phishing prevention will also be able to:

  • “Automatically flag emails from untrusted senders that have encrypted attachments or embedded scripts.
  • Warn against email that tries to spoof employee names or that comes from a domain that looks similar to your own domain.
  • Offer enhanced protections against spear phishing attacks by flagging unauthenticated email.
  • Scan images for phishing indicators and expand shortened URLs to uncover malicious links.”

Google has also improved G Suite’s enterprise-grade mobile management solution to make basic mobile device management automatically enabled. Administrators can see which devices are accessing corporate data; they can enforce pass codes and erase confidential data; and they can automatically protect Android and iOS devices.

G Suite admins will also be able to restrict users’ two-step verification methods to security keys only. Google says it recommends security keys over other forms of authentication because they are easy to use and prevent common attacks such as phishing.

Admins will also be able to add and revoke security keys; and view reports on security key usage.

Google has also implemented ‘Information Rights Management’ (IRM) controls for Team Drives to ensure documents are protected.

  • Admins can now limit file access privileges to Team Drives members, or only to users within your domain.
  • Admins can also add IRM controls to prevent users from printing, downloading and copying files within Team Drives. 

Finally, Google says it is offering better security visibility for G Suite admins. Earlier this year the company added its ‘security center’, a tool that unifies security analytics, insights and best practice recommendations.

New additions include:

  • New security charts to show OAuth activity and Business Email Compromise (BEC) scam threats that are specifically focused on phishing emails that may not have links.
  • New mobile management charts to help IT admins examine activity analytics and show when devices have been hijacked, rooted or jailbroken, as well as when other suspicious device activity has been detected.
  • Ways to reorganise the dashboard to focus on what is most important to an organisation.
  • Ways to analyse an organisation’s security health and get custom advice on security key deployment and protection against phishing scams.
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.