![]() The strict timelines around Google’s file protection process are incredibly problematic for organizations that deal with sensitive data. While businesses may be able to leverage the file versions to recover data, this is not a method that can be relied upon for wide-scale protection of business-critical data hosted in the public cloud. Google G Suite can restore data in a rudimentary fashion of “versions” of files in their cloud storage and a recycling bin that allows “un-deleting” files that have inadvertently been deleted, either accidentally or intentionally, for up to 30 days. This instant backup provides more risk than reward, in many cases. The malware will then not only infect files on an end-user's computer but will automatically upload itself to Google Drive or Shared Drives, where it can encrypt any data located there. The ransomware encryption process is viewed as a change in the file, which will trigger the synchronization process. ![]() If ransomware infects an end-user device, it will begin encrypting data that will then be synchronized. G Suite offers installable utilities to synchronize files from on-premises end-user devices to Google Drive. In addition to vulnerabilities around email, another avenue for ransomware infection that ties on-premises environments to the G Suite public cloud SaaS environment is file synchronization. Suddenly, critical data is unusable, and the organization may be roped into paying a hefty fine to enable access if they don’t have proper precautions in place. Once the infected attachment is downloaded, the malware begins encrypting any file on the user’s computer and those that they have access to in the cloud. While Google has some mechanisms for flagging these types of malicious emails, most sophisticated ransomware can easily make it past these types of filters. ![]() An end-user opens an attachment that, in actuality, contains a malicious executable file that houses ransomware. However, one of the most prominent methods is via email. Many attack vectors deliver ransomware to unsuspecting users. This article will help you understand the vulnerabilities within the G Suite offering and explain the importance of properly backing up and protecting your data to prevent catastrophic leaks and loss. Unfortunately, many companies solely rely on the built-in protections provided by Google and wrongly assume that their data is secure.ĭespite being a product of Google, G Suite is still just as susceptible to data loss as any other cloud storage provider. Most users have grown so accustomed to its ease of use and functionality that we often overlook that this data may be vulnerable to online hacks or viruses, such as ransomware. From emails to spreadsheets, sensitive company data is now easily accessible to your team on desktops, laptops, and smartphones, improving efficiency and productivity. For many organizations, Google’s G Suite is an integral piece of the day-to-day operations of running a business.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |