Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google: “Cybersecurity is Easy, Just Block the Internet!”

Google: “Cybersecurity is Easy, Just Block the Internet!”

What measures do you take to protect your employees and business from the dangers found on the Internet? One major company, Google, is implementing some extreme measures to protect against online threats. In this pilot program, the Internet is simply not available to its workers. How is Google—a company notorious for its search engine and web-related technology—making do with minimal access to the Internet? The answer might surprise you.

The Answer: Internet-Free PCs

In reality, the idea that one of the biggest companies in the technology sector would disconnect its workforce from the Internet—although initially quite shocking and counterintuitive—actually makes more sense than you might at first realize. Considering the fact that major technology companies are often the targets of cyberattacks, as well as the fact that the data they house is monumentally important and valuable, it’s hard to imagine a world where Google would not want to do all that it can to keep itself safe from these types of hacks.

Even with all of the security measures in the world, Google could, of course, still fall victim to cyberthreats if one of their employees falls for it. Many cyberthreats target the weakest link in a company’s infrastructure rather than trying to crack through powerful security measures: the company’s employees. By blocking the Internet for many employees, Google can effectively prevent most phishing attempts that would be leveraged against them. This is especially important before implementing new tools powered by artificial intelligence or working with sensitive jobs funded by government contracts.

The Internet-free program piloted by Google involves its employees only having access to sites that are owned by Google itself—sites that are housed on an internal intranet. This means that they can still access their Google Drive, Gmail, and YouTube accounts. The program itself was implemented with the intention of being mandatory for a 2,500-employee sample, but it is now open to any who wish to opt in.

Theoretically, this program should reduce the threats that any involved employee comes into contact with, but it doesn’t completely eliminate them. Google’s employees will still be at risk of various phishing attempts that get around the need for an Internet connection, like those conducted through voice or text messages.

Will This Program Be Successful?

How employees respond to these limitations will ultimately speak to the success or failure of this program. Will it impact productivity? Will it sway their opinions of the workplace? Only time will tell.

We know that not all companies have the luxury of forsaking Internet connectivity for their operations and security, which is why we offer comprehensive technology solutions to help your staff be more secure and productive throughout the course of their workdays. Learn more by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 30 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Blockchain Bandwidth Windows 10 Virtualization Business Technology Wi-Fi Vendor Apps Two-factor Authentication Data Security Mobile Office Mobile Device Management Budget BYOD Gmail Managed Services Voice over Internet Protocol Apple App Tip of the week Employer-Employee Relationship Networking Chrome HIPAA Applications WiFi Access Control Computing Conferencing Information Technology Hacker How To Avoiding Downtime Office 365 BDR Marketing Storage Password Bring Your Own Device Router Virtual Private Network Healthcare Big Data Health Help Desk Operating System Retail 2FA Risk Management Computers Managed IT Services Website Analytics Office Tips Augmented Reality Remote Monitoring Vulnerability End of Support Vendor Management Firewall Physical Security Remote Workers Display The Internet of Things Printer Paperless Office Infrastructure Going Green Social Free Resource Monitoring Project Management Windows 7 Document Management Cybercrime Windows 11 Microsoft 365 Customer Service Solutions Scam Data loss Telephone Excel Cooperation Patch Management Save Money Data Storage Telephone System Cost Management Video Conferencing Data Privacy IT Management Managed Services Provider Sports Professional Services VPN Meetings Mouse Virtual Machines Safety Administration Computer Repair User Tip Modem iPhone Processor Mobile Security Vulnerabilities Settings Wireless Machine Learning Smart Technology Printing Content Filtering Images 101 Customer Relationship Management Saving Time Multi-Factor Authentication YouTube Mobility Maintenance Cryptocurrency Supply Chain Antivirus Managed IT Service Hacking Presentation Downloads Employees Virtual Desktop LiFi Integration Licensing Data storage Wireless Technology Entertainment Outlook Money Holidays Robot Word Humor Social Networking Legislation Hacks Hypervisor Scary Stories Human Resources PowerPoint Fileless Malware Fun Cables Shopping Unified Threat Management Refrigeration Optimization Public Speaking Deep Learning Employer/Employee Relationships Unified Threat Management Content Wearable Technology Google Apps Motherboard Lithium-ion battery PCI DSS Comparison Navigation Health IT Education Entrepreneur Directions IT Maintenance Assessment Gig Economy Permissions Network Congestion Internet Service Provider Teamwork Business Intelligence User Error Shortcuts Regulations Compliance Specifications Mobile Computing Evernote Microchip Search Ransmoware Internet Exlporer Point of Sale Fraud Undo Memes Net Neutrality Best Practice SQL Server Vendors Username Be Proactive Network Management Financial Data Tech Support Black Friday History Buisness IT solutions Workforce Database Smartwatch Legal IT Monitors IT Technicians Procurement Business Growth Azure Threats Proxy Server Workplace Strategies Cookies Telework Websites Cyber Monday Application Cyber security Tech Cortana Meta Tactics CES Hotspot Communitications Mirgation IBM Supply Chain Management Electronic Medical Records Alt Codes Amazon SharePoint Nanotechnology FinTech Downtime Term Hosted Solution Outsource IT Lenovo Addiction Language IT Assessment Writing Chatbots Flexibility Virtual Reality Typing Value Environment Management Media Server Management Screen Reader Organization Private Cloud Distributed Denial of Service Knowledge Small Businesses Superfish Service Level Agreement Digital Security Cameras Identity Theft Computing Infrastructure Google Drive Competition Smart Devices Identity Remote Working Twitter Memory Displays Bookmark 5G Smart Tech Error Data Breach Google Play Electronic Health Records Social Engineering Unified Communications Experience Outsourcing Download Videos Alerts Google Docs Remote Computing Bitcoin User Wasting Time Running Cable Security Cameras Browsers Workplace Connectivity Break Fix Google Wallet Trend Micro Software as a Service Hiring/Firing Upload Tablet IP Address Alert Multi-Factor Security Windows 8 Managing Costs Laptop Social Network Paperless SSID Co-managed IT Managed IT IoT File Sharing Dark Web Drones eCommerce Dark Data Surveillance How To Virtual Assistant Technology Care Trends Regulations Notifications Google Calendar Recovery Virtual Machine Halloween Customer Resource management Business Communications Medical IT Data Analysis Scams Star Wars Reviews Travel Microsoft Excel Hard Drives Domains Development Transportation Hybrid Work Techology Gamification Google Maps Staff

Blog Archive