Google Deploys New Anti-Phishing & Malware Detection Features for G Suite Users

Haythem Elmir

Google rolled out today new security features for G Suite, its collection of enterprise, cloud computing, productivity, and collaboration tools.

While several of the G Suite services received improvements, the most interesting additions have been made to Gmail for Business, the Google service that allows companies to use Gmail as their internal email service over a custom domain.

Starting today, G Suite admins can enable new AI-powered security features inside the G Suite backend. These features have been built to detect and alert users of emails carrying potential malware and emails that are part of spear-phishing attempts.

More specifically, Google will start flagging emails carrying encrypted files, scripting files, emails containing shortened URLs, and emails that appear to come from spoofed domains or using spoofed sender names.

Here are the new features that G Suite admins can tweak in their Gmail control panels, complete with their location and a helpful image.

Apps > G Suite > Gmail > Safety > Attachments

⋙  Protect against encrypted attachments from untrusted senders
⋙  Protect against attachments with scripts from untrusted senders

New G Suite settings

Apps > G Suite > Gmail > Safety > Links and external images

⋙  Identify links behind shortened URLs
⋙  Scan linked images
⋙  Show warning prompt for any click on links to untrusted domains

New G Suite settings

Apps > G Suite > Gmail > Safety > Spoofing and authentication

⋙  Protect against domain spoofing based on similar domain names
⋙  Protect against spoofing of employee names
⋙  Protect against inbound emails spoofing your domain
⋙  Protect against any unauthenticated emails

New G Suite settings

All these new features have been rolled out today. Google plans to enable two of these by default for all G Suite customers on April 4. these are:

⋙  Identify links behind shortened URLs
⋙  Scan linked images
To read the original article:

Laisser un commentaire

Next Post

TrickBot Banking Trojan Gets Screenlocker Component

The most recent version of the TrickBot banking trojan now includes a screenlocker component, suggesting the malware’s operators might soon start holding victims for ransom if infected targets don’t appear to be e-banking users. The good news is that the screenlocker mechanism is not fully functional just yet, and appears […]