Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google: “Cybersecurity is Easy, Just Block the Internet!”

Google: “Cybersecurity is Easy, Just Block the Internet!”

What measures do you take to protect your employees and business from the dangers found on the Internet? One major company, Google, is implementing some extreme measures to protect against online threats. In this pilot program, the Internet is simply not available to its workers. How is Google—a company notorious for its search engine and web-related technology—making do with minimal access to the Internet? The answer might surprise you.

The Answer: Internet-Free PCs

In reality, the idea that one of the biggest companies in the technology sector would disconnect its workforce from the Internet—although initially quite shocking and counterintuitive—actually makes more sense than you might at first realize. Considering the fact that major technology companies are often the targets of cyberattacks, as well as the fact that the data they house is monumentally important and valuable, it’s hard to imagine a world where Google would not want to do all that it can to keep itself safe from these types of hacks.

Even with all of the security measures in the world, Google could, of course, still fall victim to cyberthreats if one of their employees falls for it. Many cyberthreats target the weakest link in a company’s infrastructure rather than trying to crack through powerful security measures: the company’s employees. By blocking the Internet for many employees, Google can effectively prevent most phishing attempts that would be leveraged against them. This is especially important before implementing new tools powered by artificial intelligence or working with sensitive jobs funded by government contracts.

The Internet-free program piloted by Google involves its employees only having access to sites that are owned by Google itself—sites that are housed on an internal intranet. This means that they can still access their Google Drive, Gmail, and YouTube accounts. The program itself was implemented with the intention of being mandatory for a 2,500-employee sample, but it is now open to any who wish to opt in.

Theoretically, this program should reduce the threats that any involved employee comes into contact with, but it doesn’t completely eliminate them. Google’s employees will still be at risk of various phishing attempts that get around the need for an Internet connection, like those conducted through voice or text messages.

Will This Program Be Successful?

How employees respond to these limitations will ultimately speak to the success or failure of this program. Will it impact productivity? Will it sway their opinions of the workplace? Only time will tell.

We know that not all companies have the luxury of forsaking Internet connectivity for their operations and security, which is why we offer comprehensive technology solutions to help your staff be more secure and productive throughout the course of their workdays. Learn more by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 December 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Hardware Internet Efficiency IT Support User Tips Malware Privacy Email Phishing Google Workplace Tips Computer Users Collaboration IT Services Hosted Solutions Mobile Device Quick Tips Ransomware Cybersecurity Workplace Strategy Microsoft Small Business Data Backup Communication Smartphone Android Saving Money Business Management VoIP Smartphones Mobile Devices communications Passwords Backup Data Recovery Managed Service Managed IT Services Social Media Microsoft Office Upgrade Browser Disaster Recovery Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Remote Work Server Managed Service Provider Windows Miscellaneous Gadgets Productivity Information Outsourced IT Current Events Encryption Spam Employee/Employer Relationship Holiday Windows 10 AI Government Office Data Management Business Continuity Compliance Blockchain Wi-Fi Training Business Technology Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Bandwidth Data Security Employer-Employee Relationship Vendor Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Budget Apple Networking App BYOD Computing Hacker Applications Information Technology Avoiding Downtime Access Control Office 365 Tip of the week Conferencing WiFi How To BDR Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Marketing Health Healthcare Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Windows 11 Customer Service Vendor Management Cybercrime 2FA Excel Display Printer Paperless Office Infrastructure Remote Workers Monitoring IT Support Firewall Document Management Free Resource Project Management Windows 7 Telephone The Internet of Things Scam Microsoft 365 Data loss Solutions Social Cooperation Telephone System Robot Customer Relationship Management Cost Management Settings Printing Wireless Holidays Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Data Storage Supply Chain Physical Security Video Conferencing Cryptocurrency Wireless Technology User Tip Modem Managed Services Provider Virtual Machines Professional Services Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Word Smart Technology iPhone Outlook Machine Learning Money Saving Time Vulnerabilities Humor Data Privacy Managed IT Service Safety Maintenance Images 101 Sports Downloads Antivirus Mobility Mouse Multi-Factor Authentication Licensing Entertainment Administration Employees Integration Travel Social Networking Legislation Managing Costs Amazon SSID Techology Fileless Malware Google Maps Cortana eCommerce Wearable Technology Surveillance Virtual Assistant Outsource IT Alt Codes Content Competition Health IT Downtime Unified Threat Management Motherboard Comparison Virtual Machine Environment Media Medical IT Unified Threat Management Directions Hosted Solution Assessment Reviews Permissions Development Transportation Small Businesses Typing Network Congestion Specifications Hypervisor Displays Optimization PowerPoint Google Drive User Error Microchip User Internet Exlporer Shopping Knowledge Fraud Employer/Employee Relationships Outsourcing Username Navigation Point of Sale PCI DSS 5G Black Friday Workplace IP Address Google Docs Unified Communications Database Gig Economy Experience Running Cable Tech Support IT Technicians Internet Service Provider Teamwork Hiring/Firing Bitcoin Network Management Evernote Paperless Google Wallet Proxy Server Cookies Regulations Compliance Monitors Cyber Monday Memes Co-managed IT Recovery Tactics Hotspot Laptop Websites Mirgation Net Neutrality SQL Server Technology Care Hard Drives Windows 8 Business Communications Domains Drones Nanotechnology Financial Data History IT Scams SharePoint Addiction Smartwatch Electronic Medical Records Language Halloween Chatbots Procurement Azure Hybrid Work Refrigeration Management Tech Human Resources Public Speaking Lenovo Screen Reader Telework Writing Distributed Denial of Service Cyber security Communitications Cables Lithium-ion battery Service Level Agreement CES Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Supply Chain Management Hacks Server Management Term Google Apps Superfish Bookmark Identity Theft Smart Tech FinTech Fun IT Assessment IT Maintenance Deep Learning Download Twitter Alerts Error Flexibility Value Business Intelligence Undo Shortcuts Browsers Education Connectivity Organization Social Engineering Break Fix Smart Devices Ransmoware Upload Digital Security Cameras Remote Computing Remote Working Multi-Factor Security Memory Vendors Mobile Computing Social Network Google Play Be Proactive Tablet IoT Search Dark Web Data Breach Electronic Health Records Workforce Application Best Practice Trends Videos Alert Buisness File Sharing Regulations Dark Data Google Calendar Wasting Time Threats Managed IT Customer Resource management Security Cameras Workplace Strategies IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Trend Micro Software as a Service Meta Business Growth Gamification Notifications Staff

Blog Archive