View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Hardware
July 19, 2017updated 21 Jul 2022 7:49am

New Google G-Suite alerts look to block unverified apps

What else will Google add to this broad array of new security features for G-Suite?

By Tom Ball

Google has been bolting on new security measures for G-Suite, and now a screen for unverified apps will be added to the fortifications.

Apps setup to use Google’s authentication process, OAuth, to access data will trigger a screen to appear so that the G-Suite user can verify it. This will be the case if the developer has not completed the verification process put in place by Google.

In an attempt to challenge the user’s lack of awareness to potential threats, the new G-Suite verification screen will also require the word ‘continue’ to be typed out for final confirmation, and to dismiss the screen.

The screen will also detail the name of the developer, and the application itself to give the user the best chance possible to work out whether they trust the legitimacy of the app and its origin.

New Google G-Suite alerts look to block unverified apps

Google have already tackled other problems with the recent addition of new anti-phishing tools, an OAuth whitelisting feature, and an enhanced app review process.

In an announcement about the new feature, Google said: “We’re committed to fostering a healthy ecosystem for both users and developers… These new notices will inform users automatically if they may be at risk, enabling them to make informed decisions to keep their information safe, and will make it easier to test and develop apps for developers.”

READ MORE: Growing phishing & ransomware success hits healthcare

New anti-phishing tools come as no surprise, as G mail has been plagued by wide reaching, formidable phishing attacks in recent months that have impacted millions of users. The whitelisting feature now means admins can control which third-party apps can access their data.

Content from our partners
The growing cybersecurity threats facing retailers
Cloud-based solutions will be key to rebuilding supply chains after global stress and disruption
How to integrate security into IT operations

The advanced phishing attacks that had been preying on G-mail users involved an embedded image and poses as being sent by a familiar contact. With the ability to tailor these phishing emails on a massive scale, many were caught out who may well have spotted the more traditionally conspicuous attacks.

Topics in this article: , , , ,
Websites in our network
NEWSLETTER Sign up Tick the boxes of the newsletters you would like to receive. Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
I consent to New Statesman Media Group collecting my details provided via this form in accordance with the Privacy Policy
SUBSCRIBED
THANK YOU