Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gmail Incorporates More Stringent Phishing Protections (But There’s a Downside)

Gmail Incorporates More Stringent Phishing Protections (But There’s a Downside)

Since 2019, Google has had a feature built into their Chrome browser called Enhanced Safe Browsing. Intended to help prevent phishing attacks, this feature effectively steps in to warn users about links that it deems suspicious. More recently, this feature was added directly to Gmail. Let’s talk about how to enable it… and why you might actually want to think twice about doing so.

What is Enhanced Safe Browsing?

Originally, Enhanced Safe Browsing was a Google Chrome feature, and more or less warned users about links that the browser deemed suspicious in an attempt to help prevent malware, phishing, and other such threats. With email playing such a major part in so many phishing attacks, however, Gmail now hosts the feature natively.

With Enhanced Safe Browsing enabled, all links and attachments will be scanned and compared to Google’s database of known scams and malicious websites—a database that Google updates every half hour.

How to Enable Enhanced Safe Browsing

You’ll need to be logged into your Google Account to do this, and from there, access Security and from there, Manage Enhanced Safe Browsing to enable it. Doing so will activate it in Gmail, as well as any other Google software you use, including Chrome, down to the extensions and file downloads.

This is the big problem we’re concerned about.

Turning On This Feature is Effectively Gifting a Ton of Personal Data to Google

Reviewing what we’ve said thus far, this feature gives Google access to most of what most people use Google’s products for (particularly in the workplace) and insight into what they are being used for. To be fair, Google does claim that this data is anonymized after a short time, but studies have revealed that this anonymization isn’t perfect.

Ultimately, we wouldn’t recommend that businesses utilize this feature as compared to other options, and especially not as a replacement for robust and comprehensive user training and phishing awareness (after all, not all phishing attacks will come through Gmail exclusively), but it is ultimately up to you.

For other ways to help better secure your IT infrastructure, Voyage Technology is here to help. Reach out to us at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Hackers Innovation Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration IT Services Users Hosted Solutions Mobile Device Quick Tips Ransomware Microsoft Workplace Strategy Small Business Cybersecurity Data Backup Communication Smartphone Passwords Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Backup Managed Service Upgrade Data Recovery Managed IT Services Browser Microsoft Office Disaster Recovery Social Media Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Server Managed Service Provider Remote Work Miscellaneous Current Events Gadgets Productivity Holiday Outsourced IT Information AI Employee/Employer Relationship Encryption Spam Windows 10 Office Training Data Management Business Continuity Compliance Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol Vendor Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Tip of the week Conferencing WiFi How To BDR BYOD Computing Hacker Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System HIPAA Healthcare Computers Router Display Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Monitoring Microsoft 365 IT Support Solutions Firewall Document Management Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation 2FA Excel Going Green Patch Management Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Customer Service Cybercrime Cryptocurrency Wireless Technology User Tip Modem Vulnerabilities Data Privacy Computer Repair Mobile Security Processor Images 101 Virtual Desktop LiFi Data storage Multi-Factor Authentication Mobility Smart Technology Word Outlook Machine Learning Money Saving Time Humor Employees Integration Managed IT Service Maintenance Safety Antivirus Sports Downloads Mouse Licensing Holidays Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Telephone System Virtual Machines Professional Services Robot Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN YouTube Meetings iPhone Physical Security Telework Username Cyber security Tech Human Resources 5G Black Friday CES Communitications Point of Sale Cables Supply Chain Management Unified Communications Database Experience IP Address Google Docs FinTech Bitcoin Network Management Running Cable Tech Support IT Technicians Term Google Apps IT Maintenance Monitors Cyber Monday Google Wallet Proxy Server IT Assessment Cookies Recovery Flexibility Tactics Value Business Intelligence Hotspot Hard Drives Organization Windows 8 Laptop Websites Mirgation Shortcuts Ransmoware Domains Digital Security Cameras Drones Smart Devices Nanotechnology Remote Working Addiction Memory Vendors Electronic Medical Records Language SharePoint Refrigeration Management Data Breach Halloween Chatbots Google Play Be Proactive Workforce Writing Distributed Denial of Service Public Speaking Videos Lenovo Electronic Health Records Screen Reader Service Level Agreement Wasting Time Threats Virtual Reality Computing Infrastructure Lithium-ion battery Hacks Server Management Entrepreneur Trend Micro Scary Stories Private Cloud Identity Security Cameras Workplace Strategies Meta Fun Superfish Bookmark Software as a Service Identity Theft Smart Tech Deep Learning Download Managing Costs Amazon Twitter Alerts Undo eCommerce Error SSID Virtual Assistant Outsource IT Social Engineering Break Fix Browsers Surveillance Education Connectivity Upload Virtual Machine Environment Remote Computing Media Reviews Mobile Computing Social Network Medical IT Multi-Factor Security Transportation Small Businesses Search Dark Web Development Tablet IoT Application Best Practice Trends Hypervisor Displays Alert Shopping Managed IT Customer Resource management Optimization Buisness File Sharing Regulations PowerPoint Dark Data Google Calendar Employer/Employee Relationships Outsourcing How To Microsoft Excel IBM Legal Data Analysis IT solutions Star Wars PCI DSS Business Growth Gamification Notifications Staff Navigation Gig Economy Travel Social Networking Workplace Legislation Teamwork Hiring/Firing Cortana Techology Fileless Malware Internet Service Provider Google Maps Regulations Compliance Alt Codes Content Wearable Technology Evernote Paperless Competition Health IT Memes Downtime Unified Threat Management Motherboard Co-managed IT Comparison SQL Server Technology Care Permissions Unified Threat Management Directions Net Neutrality Hosted Solution Assessment Financial Data Typing History Business Communications Smartwatch IT Scams Network Congestion Specifications Internet Exlporer Azure Hybrid Work Knowledge Fraud Google Drive User Error Microchip User Procurement

Blog Archive