If you ever wanted to find a treasure trove of excellent security tips — written by a top Google expert in a lively, easy-to-understand way — then look no more. Kevin A. McGrail is a cybersecurity and privacy expert who is also ranked as the #1 contributor in the world on Google’s official G Suite platform, Google Cloud Connect. In this post, he shares 31 recommendations and best practices related to passwords, email security, and more. While some of these tips are specific to G Suite, many are broader ones that can help secure any system.
Dropbox provides plenty of flexibility to collaborate on and streamline work, but end users and admins can do and see things you might not be aware of. For example, end users can create public links to entire folders. Admins can sign in as any user and view sensitive information. To minimize security risk and exposure, here are five blind spots you should know about.
In Slack, end users and admins can do (and view) some things that might surprise you. From creating public links to files to inviting external users to any public channels, here are five blind spots that you should be aware of.
Malicious or accidental configurations of automatic email forwarding rules are one of the most common causes of data exposures and compliance breaches. If employees are automatically forwarding email outside your domain, there’s a high likelihood that something is wrong. Here are 4 simple steps to address the issue once and for all.
Zendesk Senior Product Manager Max McCal joined our Slack-based community, BetterIT, for an exclusive Q&A. A wide-range of questions were answered, including many about the Zendesk product itself, improving IT helpdesk efficiency, and the future of support.
In this recap, we share the video, slides, and transcript of our in-depth webinar, “The 10 Commandments of the SaaS-Powered Workplace.”
IT admins working for companies that use Slack must know that it requires significant IT administration, especially if it’s housing sensitive company data.
So you’ve provisioned your new user in Google Apps, set him up with a shiny new account, and added him to the right groups and OU. Think your onboarding job is done? Not so fast. To really set up your users for success, there’s one more step you should take.
When new hires show up at the office on their first day, they want to hit the ground running. Here are five critical steps for provisioning and onboarding so that you keep your organization secure and set up your users for success.
Almost every company has two types of employees. The ones who scratch the surface but drill no deeper, doing the bare minimum. And then there are innovators who push boundaries. Which type of IT professional are you?