None of Google's 85,000 employees have been successfully phished in over a year — and it's because of a simple $20 product anyone can use
- Google told Business Insider that none of its employees had been successfully phished since it started requiring them to use security keys to log in.
- Phishing, or using misleading emails to steal passwords, is one of the most common ways people get hacked.
- Google attributes its success to products called security keys, or USB devices that you need in addition to a password to log in to a protected account.
One of the most common ways that people get hacked is called phishing or spearphishing.
Basically, attackers craft an email that looks just like something you'd normally click on, like a bill or an email telling you to change your password. Unsuspecting people click on the link in the phishing email, leading them to a site designed to look legitimate. The victim plugs in their username and password, unwittingly giving it to the attacker. Now there's a good chance that account will be hacked.
Spearphishing was one of the main ways Russian spies were able to break into the Democratic National Committee's network before the 2016 US election, the Justice Department says.
It's a big problem for businesses. You can make sure your computers are as secure as possible, but all it takes is one employee with access to sensitive data who gets fooled by an email to cause a bad breach.
One company, however, seems to have solved the phishing problem: Google. And it's all because of a $20 gadget called a security key, which Google requires its employees to use.
None of Google's 85,000 employees have been successfully phished on their work accounts since it started requiring security keys to log in, the company said.
"We have had no reported or confirmed account takeovers since implementing security keys at Google," Google told Business Insider.
Google started requiring employees to use physical security keys in early 2017, according to Brian Krebs, the security journalist who first reported Google's success against phishing attempts.
Your company may already require you to have two-factor authentication turned on, meaning that when you log in with a username and password, you have to enter a second code, usually texted to you or delivered through an app.
Google took this one step further and required all employees to start using security keys, according to Krebs. Instead of getting a text after entering your password, you merely plug the security key into a USB port on your computer and press a button.
That's a pretty big success for such a large company. Google has a lot of sensitive user data, so it's very encouraging to know its employees aren't getting phished.
You can use a security key with your own Gmail account. YubiKey models compatible with USB, USB-C, and mobile devices are available from Yubico.
In October, Google launched an advanced-protection program involving security keys for people at the highest risk of being phished, including journalists, business leaders, and activists. Google has also worked with various industry groups, such as the FIDO Alliance, to develop security-key technology called U2F.
A 2016 Google study found that text-message or app-based two-factor authentication, sometimes called "one-time password," had an average failure rate of 3%, while the U2F or security-key approach had a 0% failure rate.
There are more details about how Google's approach to authentication and login security is starting to pay off at Krebs on Security.
- Security Cloud Consultant, Design / Review / Advise, London
** Actively recruiting- Able to hire** Security Cloud Consultant, Design / Review / Advise with both technical design / architecture and information security (technical risk assessment) experience is needed to help a growing consultancy work with multiple clients on various security programmes. The responsibilities of the role will include, but not be limited to; Delivering high level security related design, discovering and advising against any security risk within a client’s current architecture, reviewing security architecture plans, design related consultation, technical review of architecture against policies. The Security Cloud Consultant, Design / Review / Advise, needs to have a broad Security Architecture experience including Cloud security Azure, Office265 / AWS is essential. Any of the following would be desirable, although not essential. AZ-500: Microsoft Azure Security Technologies AZ-303: Microsoft Azure Architect Technologies Travel will be required. Given the nature of the clients, the individual must be elidable to achieve UK Security clearance. Apply today for more information Chris.firstname.lastname@example.org https://www.linkedin.com/in/chrisholt1/ 07884666351
- eDiscovery Relativity Consultant
- Up to £65,000
REFCH7559 eDiscovery Relativity Consultant, Processing onwards, London, £65,000 London Experienced eDiscovery Relativity Consultant needed to join a London based client. The eDiscovery Relativity Consultant MUST have experience from the process stage onwards of the EDRM cycle. Processing, Review, Analysis, Production, Presentation. Experience optimising and improving analytics highly desirable. Identification and collection experience is useful but not essential. This individual commutable to London based as the role will be predominately office based Relativity Certified Administrator (RCA) Relativity Analytics Specialist Relativity Processing Specialist Relativity Certified User Relativity Infrastructure Specialist Fluency one or more European languages is desirable but not essential. Structured career progression available. All details kept in the strictest of confidence. Contact me on Chris.email@example.com 07884666351 or 02086634030
- Cyber Security Consultant, New Job, Devon, £60,000
Can interview and hire remotely without face to face. Cyber Security Consultant is needed in a client-facing consultancy role in the Devon area. Cyber Security Consultant needs to have a strong information security experience with a technical hands-on background. Travel will be involved with other clients, but a larger proportion of the time will be within the Devon area. This is a Security consultancy role so travel to other client site locations across the country will be expected. Broad InfoSec experience is desirable given the range of projects/programmes you will be involved in. The individual will be required to achieve or currently hold SC security clearance. Apply today. All details kept in the strictest of confidence. Chris.Holt@dclsearch.com 07884666351
- New Business Hunter - Cloud interconnect Services
- €75,000 + €75,000 OTE
Paris Reference RA 7376 Salary up to €75,000 plus 75,000 OTE New Business Hunter - Cloud Interconnect Services A new business hunter is required for this expanding Cloud Connect Services company who are looking to expand their presence within the French Market. They are looking for the right individual who enjoys targeting and winning large enterprise clients, You will be responsible for developing and managing a sales pipeline (qualification of leads, prospecting, monitoring of opportunities, closing ...) in order to go in search of future customers This is a great opportunity to join a rapidly growing business, where you will have the opportunity to become a key member of the Paris team, you will be selling a solution that is in high demand at the moment and will only become more in demand as more business adopt their cloud strategies The company currently has a number of large scale global enterprises as customers so you will have plenty of case studies to call upon. We are looking fr someone with proven new business skills, who can demonstrate new Logo accounts that they have won recently, you will need to be selling either telecom or cloud solutions and have a good understanding on connectivity services