|Google boosts security with physical keys|
If your business is lacking adequate security protection, the doors are wide open to an attack from outside. To make things worse, security threats are constantly evolving and developing, rendering them more difficult to keep up with. At least Google is on your side – its recent introduction of physical Security Keys for Drive for Work users means an extra layer of safeguarding for the cloud-based data files you rely on to power your organization.
Google already offers security precautions like two-step authentication, which provides additional protection by requiring you to enter not only your password but also a one-time code received by SMS or similar. This is a crucial weapon in the fight against hackers, since weak usernames and passwords are still be the primary reason for accounts being breached. Security Keys now take things one step further, strengthening your Google Drive account’s coat of armor to an even greater extent.
The Security Key is a physical USB device that is plugged into your computer, and which sends an encrypted signature, instead of a password or other code, to verify your identity and permit you access to your Google account. Crucially, Security Keys are inexpensive – starting from around $6 per unit – and require no additional software for deployment, use or management. Administrators have the ability to track when and where each key is used, as well as being able to disable them if lost and issue backup codes to allow staff uninterrupted access even if they do misplace their key.
Simplifying the login process is also a key part of what Google has tried to achieve with Security Keys. To that end, the first time you use your key to access your Google account on a particular computer, you can opt for Google to remember that device. On subsequent occasions you can quickly sign in using only your password, and without requiring either your key or a two-step authentication code. You can still sign in using your key on other machines, and if a hacker tries to access your account without your key they will also be prompted for a two-step verification code (which, unless they have access to your cell phone, they shouldn’t be able to provide).
Security Keys aren’t an entirely perfect solution, though – there are some significant limitations to the technology. For one, you can’t use them on mobile devices, since they require a USB port to work, and they only allow you to access your Google account through the Chrome browser. Windows, Mac OS, ChromeOS and Linux operating systems are all supported, but if you’re working from your phone or on a browser other than Chrome then you’ll need to continue using two-step authentication. Google says you can mix and match different methods of verification, opting to use Security Keys where they are supported and two-step verification otherwise (or if you don’t have your key with you).
What’s more, only Google Drive currently supports Security Keys – it’s not yet possible to use them with Google Apps, for example. But, while the technology is primarily targeted at Google Drive for Work users, it’s possible to link a single key to multiple accounts, meaning you can use it to access both your work and personal Google accounts. Some users have also queried how much of a safeguard the technology really provides in the absence of an additional PIN code or fingerprint authentication being required for activation, suggesting that a stolen Security Key could be used to access a computer that a user has previously asked Google to remember. But Security Keys do appear to offer at least some additional protection, which will be of comfort to businesses handling sensitive data.
Give us a call to find out how to employ Security Keys and other technology solutions to bolster your protection against network intrusion and data breaches.
|SEO 101: Building an online presence|
Over the past few years, technology has taken the business world by storm. With so many people using search engines to find answers, products, and local service providers, you really are missing out if you’ve failed to establish a business website. As more and more business owners jump into the website game, the scramble for the search engines’ prime spots becomes more fiercer than ever. But applying a well thought-out search engine optimization (SEO) strategy can take you straight up to the top. Here’s what you need to know to build an online presence.
|Why cloud hosts work for business continuity|
Businesses rely on an effective business continuity plan to carry them through the storm of disasters. Good continuity plans secure your critical data and keep your company up and running through interruptions of any kind. But having your in-house IT department manage data backup could spell disaster for your business – there’s a good chance that the data backup process will be misconfigured or insufficient. That’s where cloud hosts come in. You can offload key infrastructure components to a cloud hosting provider to simplify data backup. Here are some reasons to consider cloud
backup over internal backup.
|5 IT investment blunders to avoid|
Being a business owner, you know more than anyone that making mistakes is natural and that you have to be willing to fail if you want to succeed. You also know you can accomplish more – and more quickly – if you can learn from the mistakes of others before making the same missteps on your own. This philosophy applies to many areas of business and life, but did you know that it also applies to IT? Here are five mistakes to avoid when investing in new technology.
|4 exciting new features of Office 2016|
If you’ve already jumped on the Google Apps or Office 365 bandwagon, you may feel that the classic Microsoft Office package installed locally on your desktop is a bit dated. With Office 2016 set to launch in autumn of this year, Microsoft is making some changes to adapt one of their best selling products to the modern workforce. Here are four of the most exciting features.