Five Threats Google Apps Can’t Defend Against, But You Can

1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Threats Google Apps Can’t Defend Against, But You Can-3 Next

A security breach occurs anytime someone undesirable gains access to your Google Apps domain. It can take place in the form of a hard breach, in which the software itself is compromised, or as a soft breach, through which an attacker tricks one of your users into granting “legitimate” access to your Google Apps domain. If a hacker obtains an account password, he or she can effectively corrupt or delete all of the data in that account. Beyond bringing your staff up to speed on good Internet safety habits, all Google Apps users should be required to use a two-factor authentication method, in which users input both a password and a time-sensitive code to log in to Google Apps.

Three out of five companies that suffer a major data loss shut down after six months. That’s a scary, eye-opening statistic. Many of these companies have that data in public clouds, including Google Apps. While there are dozens of really good reasons to use Google Apps for your business, legitimate risks are associated with any software-as-a-service (SaaS) application suite, including Google Apps.

A single Google Apps account can comprise $100,000 worth of data. In some respects, Google Apps is the safest productivity suite in the world. Google does not lose data on its own. However, Google is told to delete data. Far too often, Google is told to delete the wrong data, or the wrong person or program is issuing instructions to delete your information. If you’re running a Google Apps domain, are thinking of running one, or simply don’t want to lose every bit of priceless business data you’ve ever owned, here are five potential threats, identified by Emily Glass, creative product manager and usability expert for Backupify, that Google cannot defend against, but you can (and should).


Related Topics : Fujitsu, Storage Virtualization, Desktop Virtualization, Virtual Tape Library, InfiniBand

More Slideshows

DataM63-290x195 Data Storage Today: Key Takeaways from VMworld 2016

Survey findings include pain points for secondary storage, average restore times, the growth of hyperconvergence and rate of cloud adoption in enterprises.  ...  More >>

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

OwnBackupCloudDataRisk0x Top 3 Cloud Backup Dangers and How to Avoid Them

The top three data dangers lurking in cloud environments and tips for how to manage data protection and backup in a SaaS-based world. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.