Traditionally only the world's wealthiest organizations had access to state of the art security. Not anymore.Read More
A common question is, "how do I share subfolders in Team Drives?" With the current system, especially traditional file servers, it's extremely common to have different sharing permissions in subfolders than exist in the top level folder(s).Read More
Google Apps supports the implementation of an extremely secure HIPPA Compliant environment with minimal implementation and support cost. There's no service in the world that can offer the same level of ongoing security per dollar invested.Read More
Sometimes we prefer files not be downloaded. Perhaps we want to ensure the most up to date information is always referenced and don't want people making their own copies.
Thankfully Google has made this pretty easy.Read More
MDM for Android has been available for sometime and now Google has added iOS Sync for Google Apps. iOS Sync for Google Apps helps deliver the 'increased security' needed to protect files, emails, documents and more on an iPhone or iPad.Read More
There's been a great deal of talk this week about the security of the "cloud". iCloud is the current focus of cloud security as the service seems to be the source of leaked, private data of several high profile celebrities.
We think this is a great time to revisit the security of your Gmail and Google Apps accounts.Read More
Is security the most important attribute of a technology solution? No, it's not. Otherwise no one would be using Microsoft Windows. Security is not a fixed state of being. Security is a constant battle of good guys vs bad guys and it's always in flux. Great security last week could be terrible security this week if an issue was discovered in server software you're running. Cloud computing offers your organization the best security you have ever had access to and it's affordable!Read More
Phishing attacks are typically looking for one thing, email addresses. Once an account is compromised, the attacker has full access to the victim's contacts.
Frequent attacks against Yahoo! and a massive attack against AOL, along with ongoing attacks against individual consumers, has placed A LOT of email addresses in the wrong hands. Do you have a friend who still has an AOL or Yahoo! account? The bad guys probably have your email address too, even if you've been keeping up to date on your security practices.
While email addresses are often the target, sometimes there are larger stakes.Read More
Frequently we receive a frantic call from a client that email is “down.” In 2013, Gmail was up 99.978% of the year. So email is not “down”, the problem is specific to this client. When a Google Apps clients goes “down,” with a 0.022% exception, someone has messed up the domain’s email routing records. These records are part of the Domain Name System, DNS.Read More
It usually starts the same way each time, you get an email from one of your contacts, "Hey, I got this weird email from you?"
You immediately know you didn't send them anything weird or otherwise. You check your sent items for clues. Sometimes clues are right there, sometimes the bad guys have covered their tracks. What do you do now?Read More
The EFF has released a report detailing how companies are protecting our data. Google and Dropbox have followed all 5 encryption best practices, check out this infographic to see how others are doing. Regardless if you are a business of 1 or 1,000's - your data deserves to be protected.Read More
The Dropbox service is used in 95% of Fortune 500 companies and by 2 million businesses worldwide. Businesses save over 600 million files to Dropbox every week. The challenge for IT teams comes from the fact that most of this use inside of businesses is being done with disjointed and often shared consumer accounts. These consumer accounts run outside the purview of company policy and procedure practices as well as security practices.