Zen Managed ServicesZen Managed ServicesZen Managed ServicesZen Managed Services
  • Services
    • Domain Names
    • Managed Cyber Security
    • Secure VPN
    • Hosting
      • Managed WordPress Hosting
      • ColdFusion Hosting
      • Lucee Hosting
      • SmarterMail Hosting
    • Migration Services
    • Managed WordPress
    • Email Filtering & Archiving
    • Acronis Cloud Backup
  • Support
    • Open Ticket
    • Knowledgebase
    • News/Announcements
  • BLOG
  • Contact
  • Clients
    • Client Area
    • Hosting Control Panel
    • RMM Dashboard

New Gmail security features to protect you from phishing and ransomware

    Home News New Gmail security features to protect you from phishing and ransomware
    NextPrevious

    New Gmail security features to protect you from phishing and ransomware

    By russmichaels | News, Security | 0 comment | 29 June, 2019 | 0

    Google is rolling out new security features to help organizations halt email as the attack vector for ransomware.

    While mass ransomware attacks have become less frequent, targeted attacks are on the rise and causing major pains for organizations, with two Florida city councils forking out $600,000 and $500,000 in ransom payments this week after sustained system outages due to ransomware.

    Organizations can choose to pay huge ransoms or deal with the consequences of the malware, which cost Norwegian metal giant Norsk Hydro at least $40m within one week of an attack that crippled its production operations in North America.

    Google’s new security sandbox aims to deal with these threats if they come through the inbox, addressing malicious embedded scripts in email attachments.

    Security Sandbox

    The email attachments will open as if the user had actually clicked on the attachment, allowing Google to check a script’s behavior and detect previously unknown threats. The company announced the feature in beta this April and is now releasing it generally for G Suite users.

    The security feature is similar to the Microsoft Office 365 features available today to enterprise customers through Advanced Threat Protection, which offers a URL detonation chamber and additional protection against phishing.

    G Suite admins can setup rules to define which messages are put through the security sandbox and move captured email to an admin-controlled quarantine. The features will be rolling out to enterprise customers in a few weeks.

    G Suite customers can also expect new default ‘advanced phishing and malware protection’. Admins can deflect phishing email and email-borne malware to a quarantine and identity suspicious attachments and display a warning banner to users.

    Google is also ramping up protections against business email compromise (BEC) fraud, which cost US companies $1.3bn in 2018.

    The default security feature promises to help organizations “identify unauthenticated emails trying to spoof your domain and choose to automatically display a warning banner, send them to spam, or quarantine the messages”, Google promises.

    Finally, Google is rolling out ‘confidential mode’ self-destructing email as a generally available feature in Gmail. It released the feature last year.

    “Confidential mode in Gmail offers built-in Information Rights Management (IRM), which removes the option for people to forward, copy, download or print messages. This helps reduce the risk of recipients accidentally sharing confidential information with the wrong people,” Google explains.

    Users can also require the recipient to authenticate via a text message to view an email.

    One last security feature Google has announced for G Suite users are security codes for browsers that don’t yet support login with security keys, such as Google’s Titan keys.

    The one-time codes are aimed at organizations that rely on Internet Explorer to access internal business applications.

    “A user may need to access a web application that federates their Google identity, but only works on Internet Explorer 11,” Google explains.

    “While the browser can’t communicate with a security key directly, the user can open a Chrome browser and generate a security code, which can then be entered in Internet Explorer to gain access to the application.”

    If you would like to upgrade your email to G Suite for business, then please get in touch
    No tags.

    russmichaels

    More posts by russmichaels

    Related Posts

    • 54% of UK companies hit by ransomware attacks

      By russmichaels | 0 comment

      All experts agree that ransomware is unpredictable, hard if not impossible to prevent, and is currently showing no signs of slowing. Businesses are facing numerous challenges from this evolving, dangerous threat, with Andy Buchanan fromRead more

    • The business of cybercrime

      By russmichaels | 0 comment

      Think of a cyber criminal and what do you see? For many of us the answer is an obsessive loner, working from ‘criminal headquarters’ that are nothing more than a cramped bedsit. While that imageRead more

    • Cybercriminals are now stealing off each other

      By russmichaels | 0 comment

      The cost of ransomware attacks: $1 billion this year And it’s only the beginning, with file locking malware only set to grow and take larger role in cybercrime, warn researchers. Read More Contact ZenMSP todayRead more

    • Is your hosting provider secure?

      By russmichaels | 0 comment

      In the past month, WordFence forensic analysts ran into two situations where they saw a significant number of site cleaning customers, all from the same hosting companies, all with the same malware. In both cases theRead more

    • Microsoft announces end of life (EOL) on Windows Vista

      By russmichaels | 0 comment

      What Does This Mean? As of today Windows Vista has now reached the end of its product support lifecycle after completing five successful years. In other words, Microsoft will no longer be supporting Windows Vista, andRead more

    • New malware targets governments

      By russmichaels | 0 comment

      New malware uses password recovery and backup tools to steal data A new type of attacks targeting government agencies uses readily available software such as password recovery and backup tools to infect victim organizations andRead more

    • Microsoft Master File Table bug exploited to BSOD Windows 7, 8.1

      By russmichaels | 0 comment

      Until Microsoft patches this problem, use Chrome: a slip in file path handling allows an attacker to crash Windows 7 and Windows 8.1 with a simple file call. The bug is triggered if Windows’ MasterRead more

    • Massive GoldenEye / Petya ransomware attack is currently unfolding worldwide.

      By russmichaels | 0 comment

        Another month, another global ransomware attack. Just as it seemed that the threat of WannaCry has dissipated, organisations around the world are finding themselves under siege from a new threat. Bitdefender has identified aRead more

    NextPrevious

    Categories

    • News
    • Products & Services
    • Security
    • Tutorials
    • Uncategorized

    Recent Posts

    • 7 ways to defend your network from fatal DDoS attacks
    • New Gmail security features to protect you from phishing and ransomware
    • Updates to our Cybersecurity solution
    • DON’T MISS OUT! – Last chance to claim your .uk domain name
    • How to make your Website GDPR compliant

    Recent Comments

      Archives

      • November 2020
      • June 2019
      • April 2018
      • March 2018
      • November 2017
      • September 2017
      • August 2017
      • July 2017
      • June 2017
      • May 2017
      • April 2017
      • March 2017
      • February 2017
        Legal Documents
      • Hosting Master Service Agreement
      • Terms & Conditions
      • Privacy Policy
      • Services
        • Domain Names
        • Managed Cyber Security
        • Secure VPN
        • Hosting
          • Managed WordPress Hosting
          • ColdFusion Hosting
          • Lucee Hosting
          • SmarterMail Hosting
        • Migration Services
        • Managed WordPress
        • Email Filtering & Archiving
        • Acronis Cloud Backup
      • Support
        • Open Ticket
        • Knowledgebase
        • News/Announcements
      • BLOG
      • Contact
      • Clients
        • Client Area
        • Hosting Control Panel
        • RMM Dashboard
      Zen Managed Services