ALL >> Business >> View Article
The Recent Phishing Attack On Gmail Users Highlights Google's Excellent Security Procedures

The recent phishing attack on GMail users highlights Google's excellent security procedures
The recent news of the spear phishing attach on Gmail users has highlighted some interesting points about Gmail and the security of it. The resent attack which is believed to have originated from China used the same old method of sending users an email that included a malware link which prompted them to enter their Gmail address and password. This info was apparently used to access and monitor their Gmail accounts illegally.
These types of phishing attacks from China are not new. China attacking Google is old news. What is news about this story is how quickly Google was aware of it which meant the numbers of users affected was very limited.
This was not a breach due to any vulnerability in Google's security systems as it was an attack aimed at the user. This type of phishing attack could have come though any email system. It was up to the user to disclose the information not Google.
This has proven that Google has an excellent intrusion detection system that monitors and flags any unusual behaviour in ...
... its GMail accounts which it did in this case. If a UK GMail user had responded to the recent spear phishing e-mail and then their account was accessed from a Chinese IP address, Google will automatically alert this unusual activity to the account user.
In February Google added two-factor authentication for those that want it. Google added this for corporate users of Google Apps for Business in 2010 but now it has rolled out for everyone that wants to use it.
This enhanced verification is a bit like what you see on banking websites where you need your existing password and a special new second passcode to put a payment through. The second passcode is one that you don't need to write down or memorise because it's constantly changing. You generate this secondary password by either a smartphone app 'Google Authenticator' which is available for Android, iPhone, and BlackBerry or via a one-time text or call sent to a registered mobile. This system is nearly impossible to phish and protects GMail accounts from exposure even if the user did inadvertently disclose their login credentials.
Security has always been an area which Google invests a lot of time and research into. This recent incident has highlighted the level and success of Google's security procedures and their understanding of online applications.
For more information about Google Apps Email visit Ancoris who are are a authorised Google Apps Reseller.
Add Comment
Business Articles
1. Lucintel Forecasts The Global Wall-mounted Ac Ev Charger Market To Grow With A Cagr Of 22.4% From 2025 To 2031Author: Lucintel LLC
2. Technology Landscape, Trends And Opportunities In Global 3d Printing Photopolymer Market
Author: Lucintel LLC
3. Lucintel Forecasts The Global Smart Home Market To Reach $372 Billion By 2030
Author: Lucintel LLC
4. Second Marriage Matrimonial – Verified Matches & Free Registration
Author: Truelymarry
5. Core: Leading The Way In Managed It Services For Businesses Across London
Author: IT Management
6. The Role And Function Of A Collection Agency
Author: Bennett Carter
7. Understanding Debt Collection Agencies: What They Do And How They Affect Consumers
Author: Bennett Carter
8. How To Use An Smm Panel Effectively For Fast Social Media Growth
Author: Smm Panel
9. Essential Tips For Beginners And The Power Of Professional Editing
Author: Sam
10. How To Improve Field Staff Efficiency With Geolocation Tools
Author: TrackHr App
11. Building An Effective Energy Management System
Author: Jane
12. Internal Auditor Training: The Key To Effective Risk Management And Compliance
Author: Sqccertification
13. Why Accurate Accounting In Property Management Is The Key To Higher Roi
Author: Harsh Vardhan
14. Kaal Sarp Puja In Trimbakeshwar – Benefits, Process & Trusted Pandit Contact
Author: Pandit Milind Guruji
15. Data Entry Vs. Data Processing: What’s The Difference And Why It Matters
Author: Allianze BPO