Using Google Takeout to Migrate G Suite data

Using Google Takeout to Migrate G Suite data

Google Takeout creates a copy of your data … which you can do anything you’d like with. Google Takeout is a free service available to any type of Google Account. For security reasons, it can be disabled by G Suite Administrators. We frequently come across organizations leveraging Google Takeout to enable migration projects of various scopes and sizes. Don’t do this.

Read More

Migrate personal Google Drives into company G Suite accounts

Migrate personal Google Drives into company G Suite accounts

It's not uncommon to come across an organization with dozens or even hundreds of employees leveraging the consumer (free) version of Google Drive to manage and share work content. There are a lot of reasons this is a bad idea. 

Read More

Share subfolders in Team Drives

Share subfolders in Team Drives

A common question is, "how do I share subfolders in Team Drives?" With the current system, especially traditional file servers, it's extremely common to have different sharing permissions in subfolders than exist in the top level folder(s). 

Read More

HIPPA Compliance and Google Apps

HIPPA Compliance and Google Apps

Google Apps supports the implementation of an extremely secure HIPPA Compliant environment with minimal implementation and support cost. There's no service in the world that can offer the same level of ongoing security per dollar invested. 

Read More

Google Apps and your privacy

Google Apps and your privacy

Today Google announced that Google Apps for Work has adopted the ISO 27018 cloud privacy standard. ISO/IEC 27018:2014 establishes commonly accepted control objectives, controls and guidelines for implementing measures to protect Personally Identifiable Information (PII) in a public cloud computing environment. 

Read More

Protecting your Gmail and Google Apps data

Protecting your Gmail and Google Apps data

There's been a great deal of talk this week about the security of the "cloud". iCloud is the current focus of cloud security as the service seems to be the source of leaked, private data of several high profile celebrities. 

We think this is a great time to revisit the security of your Gmail and Google Apps accounts. 

Read More

Sophisticated Amazon phishing attack making the rounds

Sophisticated Amazon phishing attack making the rounds

Phishing attacks are typically looking for one thing, email addresses. Once an account is compromised, the attacker has full access to the victim's contacts. 

Frequent attacks against Yahoo! and a massive attack against AOL, along with ongoing attacks against individual consumers, has placed A LOT of email addresses in the wrong hands. Do you have a friend who still has an AOL or Yahoo! account? The bad guys probably have your email address too, even if you've been keeping up to date on your security practices. 

While email addresses are often the target, sometimes there are larger stakes. 

Read More

Why you should never give up your registration or your DNS

Why you should never give up your registration or your DNS

Frequently we receive a frantic call from a client that email is “down.” In 2013, Gmail was up 99.978% of the year. So email is not “down”, the problem is specific to this client. When a Google Apps clients goes “down,” with a 0.022% exception, someone has messed up the domain’s email routing records. These records are part of the Domain Name System, DNS.

Read More

I think my Gmail was hacked?!?

I think my Gmail was hacked?!?

The Attack

It usually starts the same way each time, you get an email from one of your contacts, "Hey, I got this weird email from you?" 

You immediately know you didn't send them anything weird or otherwise. You check your sent items for clues. Sometimes clues are right there, sometimes the bad guys have covered their tracks. What do you do now?

Read More

How Google and Dropbox protect your data.

The EFF has released a report detailing how companies are protecting our data. Google and Dropbox have followed all 5 encryption best practices, check out this infographic to see how others are doing. Regardless if you are a business of 1 or 1,000's - your data deserves to be protected. 

Read More

Which companies fight for your privacy?

By now most people have heard of PRISM, the NSA's program to collect, analyze and leverage telephony and Internet data.  

Google, more than any other company, is at the very heart of Internet culture and technology. Hundreds of millions of people leverage Google services everyday to manage their personal and professional lives. There have been a lot of interesting headlines, news reports and there are still many unknown questions.  

However, we do know several important points worth mentioning.  

Read More