Navigating Cybersecurity: Google’s Pilot Program to Secure User Trust

Reading Time: ( Word Count: )

July 19, 2023
Nextdoorsec-course

According to CNBC, Google will launch a new pilot programme on Wednesday that would limit some staff to using internet-free desktop PCs.

Over 2,500 staff members were initially chosen by the organisation to take part. The corporation changed the pilot to permit staff to opt out and welcome volunteers after hearing feedback. On a few workstations, the business will turn off internet connectivity, except internal web applications and Google-owned domains like Google Drive and Gmail. According to the company’s papers, some employees who require internet access for their jobs will be granted an exception.

Additionally, some workers won’t have root privileges, making it impossible to execute administrative tasks or set up the programme.

According to its records, Google is implementing the programme to lower the danger of intrusions. Google employees are frequently the target of assaults, according to an official report seen by CNBC. 

Suppose a Google employee’s device is compromised. According to the explanation, the hackers might gain access to network code and user data, which could cause a serious problem and damage user confidence.

Also Read: “Nation-State Threat Actor Targets JumpCloud: A Detailed Report”

Google's Pilot Program to Secure User Trust

According to the description, disabling basic web access ensures that intruders can’t swiftly run any programme remotely or steal data.

The programme is released as businesses experience more advanced cyberattacks. Microsoft claimed last week that two dozen federal institutions, such as the State Department, in the US and Western Europe had their business email addresses compromised by Chinese espionage in a “major” incident.

Since launching a public sector division last year, Google has pursued U.S. government contracts.

It also occurs as Google works to strengthen its defences by getting ready to push out several AI tools throughout the entire firm. In recent weeks, the corporation has also worked harder to stop leaks. 

One of Google’s main goals is to guarantee the security of its users and services, a company representative wrote in an email. We look daily at ways to fortify our internal IT infrastructure against hostile assaults.

Saher Mahmood

Saher Mahmood

Author

Saher is a cybersecurity researcher with a passion for innovative technology and AI. She explores the intersection of AI and cybersecurity to stay ahead of evolving threats.

Other interesting articles

Automated vs Manual Penetration Testing

Automated vs Manual Penetration Testing

Pentesting is largely divided into two methodologies: Automated vs Manual Penetration Testing. Both have ...
8 Steps in Penetration Testing You Should Know

8 Steps in Penetration Testing You Should Know

Mastering the art of penetration testing has become a critical ability for security experts to combat cyber ...
Spear Phishing vs Whaling: What is the Difference

Spear Phishing vs Whaling: What is the Difference

Spear phishing is a particularly devious type of phishing assault in which the individual targeted plays a ...
0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *