View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Hardware
July 19, 2017updated 21 Jul 2022 7:49am

New Google G-Suite alerts look to block unverified apps

What else will Google add to this broad array of new security features for G-Suite?

By Tom Ball

Google has been bolting on new security measures for G-Suite, and now a screen for unverified apps will be added to the fortifications.

Apps setup to use Google’s authentication process, OAuth, to access data will trigger a screen to appear so that the G-Suite user can verify it. This will be the case if the developer has not completed the verification process put in place by Google.

In an attempt to challenge the user’s lack of awareness to potential threats, the new G-Suite verification screen will also require the word ‘continue’ to be typed out for final confirmation, and to dismiss the screen.

The screen will also detail the name of the developer, and the application itself to give the user the best chance possible to work out whether they trust the legitimacy of the app and its origin.

New Google G-Suite alerts look to block unverified apps

Google have already tackled other problems with the recent addition of new anti-phishing tools, an OAuth whitelisting feature, and an enhanced app review process.

In an announcement about the new feature, Google said: “We’re committed to fostering a healthy ecosystem for both users and developers… These new notices will inform users automatically if they may be at risk, enabling them to make informed decisions to keep their information safe, and will make it easier to test and develop apps for developers.”

READ MORE: Growing phishing & ransomware success hits healthcare

New anti-phishing tools come as no surprise, as G mail has been plagued by wide reaching, formidable phishing attacks in recent months that have impacted millions of users. The whitelisting feature now means admins can control which third-party apps can access their data.

Content from our partners
How to turn the evidence hackers leave behind against them
Why food manufacturers must pursue greater visibility and agility
How to define an empowered chief data officer

The advanced phishing attacks that had been preying on G-mail users involved an embedded image and poses as being sent by a familiar contact. With the ability to tailor these phishing emails on a massive scale, many were caught out who may well have spotted the more traditionally conspicuous attacks.

Topics in this article: , , , ,
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU