Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google: “Cybersecurity is Easy, Just Block the Internet!”

Google: “Cybersecurity is Easy, Just Block the Internet!”

What measures do you take to protect your employees and business from the dangers found on the Internet? One major company, Google, is implementing some extreme measures to protect against online threats. In this pilot program, the Internet is simply not available to its workers. How is Google—a company notorious for its search engine and web-related technology—making do with minimal access to the Internet? The answer might surprise you.

The Answer: Internet-Free PCs

In reality, the idea that one of the biggest companies in the technology sector would disconnect its workforce from the Internet—although initially quite shocking and counterintuitive—actually makes more sense than you might at first realize. Considering the fact that major technology companies are often the targets of cyberattacks, as well as the fact that the data they house is monumentally important and valuable, it’s hard to imagine a world where Google would not want to do all that it can to keep itself safe from these types of hacks.

Even with all of the security measures in the world, Google could, of course, still fall victim to cyberthreats if one of their employees falls for it. Many cyberthreats target the weakest link in a company’s infrastructure rather than trying to crack through powerful security measures: the company’s employees. By blocking the Internet for many employees, Google can effectively prevent most phishing attempts that would be leveraged against them. This is especially important before implementing new tools powered by artificial intelligence or working with sensitive jobs funded by government contracts.

The Internet-free program piloted by Google involves its employees only having access to sites that are owned by Google itself—sites that are housed on an internal intranet. This means that they can still access their Google Drive, Gmail, and YouTube accounts. The program itself was implemented with the intention of being mandatory for a 2,500-employee sample, but it is now open to any who wish to opt in.

Theoretically, this program should reduce the threats that any involved employee comes into contact with, but it doesn’t completely eliminate them. Google’s employees will still be at risk of various phishing attempts that get around the need for an Internet connection, like those conducted through voice or text messages.

Will This Program Be Successful?

How employees respond to these limitations will ultimately speak to the success or failure of this program. Will it impact productivity? Will it sway their opinions of the workplace? Only time will tell.

We know that not all companies have the luxury of forsaking Internet connectivity for their operations and security, which is why we offer comprehensive technology solutions to help your staff be more secure and productive throughout the course of their workdays. Learn more by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Collaboration Users Mobile Device Ransomware Quick Tips Workplace Strategy Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Managed Service Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Remote Tech Term Network Internet of Things Current Events Productivity Artificial Intelligence Automation Facebook Cloud Computing Covid-19 Gadgets AI Server Remote Work Managed Service Provider Miscellaneous Information Holiday Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Government Training Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Virtualization Data Security Two-factor Authentication Mobile Office Apps BYOD Vendor Mobile Device Management Chrome Gmail Budget Managed Services Apple Voice over Internet Protocol App Employer-Employee Relationship Networking How To BDR Computing Hacker Information Technology Avoiding Downtime Marketing Applications Office 365 IT Support Access Control Tip of the week WiFi Conferencing Operating System Computers Risk Management HIPAA Website Router Virtual Private Network Office Tips Analytics Augmented Reality Health Help Desk Storage Password Bring Your Own Device Big Data Retail Healthcare Managed IT Services Cooperation Free Resource Project Management Windows 7 Customer Service Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Printer Paperless Office Firewall Windows 11 Infrastructure Monitoring 2FA Excel The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Going Green Data Privacy Settings Printing Wireless Content Filtering Images 101 Hacking Telephone System Presentation Multi-Factor Authentication YouTube Robot Mobility Cost Management Cryptocurrency Wireless Technology IT Management VPN Employees Meetings Virtual Desktop Integration Data storage LiFi User Tip Modem Word Computer Repair Mobile Security Processor Outlook Money Holidays Humor Data Storage Smart Technology Supply Chain Safety Video Conferencing Machine Learning Managed Services Provider Sports Saving Time Mouse Virtual Machines Professional Services Administration Managed IT Service Maintenance Antivirus Downloads iPhone Licensing Vulnerabilities Entertainment Customer Relationship Management Trends Supply Chain Management Alt Codes Alert Managed IT Customer Resource management FinTech Competition File Sharing Regulations Downtime Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Hosted Solution Gamification Flexibility Typing Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Ransmoware Knowledge Techology Fileless Malware Digital Security Cameras Google Drive Google Maps Smart Devices User Content Remote Working Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive 5G Permissions Workforce Experience Unified Threat Management Directions Videos IP Address Google Docs Assessment Electronic Health Records Unified Communications Bitcoin Wasting Time Threats Running Cable Google Wallet Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Internet Exlporer Software as a Service Recovery Username Hard Drives Windows 8 Managing Costs Amazon Laptop Domains Drones Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Network Management Refrigeration Tech Support IT Technicians Virtual Machine Environment Halloween Media Proxy Server Reviews Public Speaking Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Lithium-ion battery Tactics Development Hacks Websites Mirgation Hypervisor Displays Entrepreneur Scary Stories Shopping Nanotechnology Optimization PowerPoint Fun Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Deep Learning Management PCI DSS Undo Chatbots Navigation Lenovo Gig Economy Screen Reader Education Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Server Management Regulations Compliance Mobile Computing Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Search Best Practice Twitter Alerts SQL Server Technology Care Download Net Neutrality Application Financial Data Error History Buisness Business Communications Browsers Smartwatch IBM Legal Connectivity IT IT solutions Social Engineering Break Fix Scams Upload Procurement Business Growth Remote Computing Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Cortana CES Tablet IoT Communitications

Blog Archive