Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google: “Cybersecurity is Easy, Just Block the Internet!”

Google: “Cybersecurity is Easy, Just Block the Internet!”

What measures do you take to protect your employees and business from the dangers found on the Internet? One major company, Google, is implementing some extreme measures to protect against online threats. In this pilot program, the Internet is simply not available to its workers. How is Google—a company notorious for its search engine and web-related technology—making do with minimal access to the Internet? The answer might surprise you.

The Answer: Internet-Free PCs

In reality, the idea that one of the biggest companies in the technology sector would disconnect its workforce from the Internet—although initially quite shocking and counterintuitive—actually makes more sense than you might at first realize. Considering the fact that major technology companies are often the targets of cyberattacks, as well as the fact that the data they house is monumentally important and valuable, it’s hard to imagine a world where Google would not want to do all that it can to keep itself safe from these types of hacks.

Even with all of the security measures in the world, Google could, of course, still fall victim to cyberthreats if one of their employees falls for it. Many cyberthreats target the weakest link in a company’s infrastructure rather than trying to crack through powerful security measures: the company’s employees. By blocking the Internet for many employees, Google can effectively prevent most phishing attempts that would be leveraged against them. This is especially important before implementing new tools powered by artificial intelligence or working with sensitive jobs funded by government contracts.

The Internet-free program piloted by Google involves its employees only having access to sites that are owned by Google itself—sites that are housed on an internal intranet. This means that they can still access their Google Drive, Gmail, and YouTube accounts. The program itself was implemented with the intention of being mandatory for a 2,500-employee sample, but it is now open to any who wish to opt in.

Theoretically, this program should reduce the threats that any involved employee comes into contact with, but it doesn’t completely eliminate them. Google’s employees will still be at risk of various phishing attempts that get around the need for an Internet connection, like those conducted through voice or text messages.

Will This Program Be Successful?

How employees respond to these limitations will ultimately speak to the success or failure of this program. Will it impact productivity? Will it sway their opinions of the workplace? Only time will tell.

We know that not all companies have the luxury of forsaking Internet connectivity for their operations and security, which is why we offer comprehensive technology solutions to help your staff be more secure and productive throughout the course of their workdays. Learn more by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 17 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Passwords Managed Service Cybersecurity Communication Smartphone Data Backup Android Disaster Recovery AI Data Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Blockchain Two-factor Authentication Apps Vendor Data Security Mobile Office Gmail Managed Services Voice over Internet Protocol WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking App Mobile Device Management BYOD Computing Information Technology Conferencing Access Control Office 365 Hacker HIPAA How To Avoiding Downtime BDR Applications Marketing Virtual Private Network Risk Management Health Healthcare Big Data Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Computers Managed IT Services Router Website 2FA Operating System Help Desk Firewall Physical Security Excel Display Printer Remote Workers Paperless Office The Internet of Things Telephone Infrastructure Social Document Management Cooperation Free Resource Project Management Windows 7 Microsoft 365 Customer Service Scam Data loss Solutions Going Green Patch Management Save Money Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Monitoring Cybercrime VPN Video Conferencing YouTube Meetings Managed Services Provider Saving Time Cryptocurrency Virtual Machines Professional Services Computer Repair Safety Managed IT Service Virtual Desktop Downloads Data storage LiFi iPhone Licensing Outlook Entertainment Machine Learning Vulnerabilities Money Data Privacy Humor Images 101 Customer Relationship Management Multi-Factor Authentication Mobility Telephone System Maintenance Antivirus Cost Management Sports Mouse Hacking Presentation Administration Employees Integration Wireless Technology Modem User Tip Processor Mobile Security Robot Holidays Settings Word Printing Wireless Content Filtering Data Storage IT Management Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Network Congestion Public Speaking Chatbots Knowledge Lithium-ion battery Navigation Google Drive User Error Management PCI DSS Gig Economy Screen Reader Distributed Denial of Service Workplace Entrepreneur Service Level Agreement Internet Service Provider Point of Sale Computing Infrastructure Teamwork Hiring/Firing 5G Identity Experience Evernote Paperless Google Docs Regulations Compliance Unified Communications Bookmark Bitcoin Network Management Smart Tech Memes Running Cable Tech Support Co-managed IT Undo Google Wallet Download Net Neutrality Alerts SQL Server Technology Care Monitors History Business Communications Financial Data Browsers Smartwatch Windows 8 Connectivity IT Laptop Websites Break Fix Scams Drones Upload Procurement Azure Hybrid Work Cyber security Electronic Medical Records Multi-Factor Security Tech Human Resources Application SharePoint Social Network Telework CES IoT Communitications Halloween Dark Web Cables IBM Lenovo Trends Supply Chain Management Writing Regulations Virtual Reality Google Calendar Term Google Apps Customer Resource management FinTech Data Analysis Hacks Server Management Star Wars IT Assessment Scary Stories Private Cloud Microsoft Excel IT Maintenance Superfish Gamification Flexibility Identity Theft Staff Value Business Intelligence Fun Social Networking Twitter Legislation Shortcuts Organization Deep Learning Fileless Malware Digital Security Cameras Smart Devices Error Ransmoware Competition Content Remote Working Education Wearable Technology Memory Vendors Social Engineering Motherboard Data Breach Remote Computing Comparison Google Play Be Proactive Health IT Directions Videos Mobile Computing Assessment Electronic Health Records Permissions Workforce Search User Tablet Wasting Time Threats Best Practice Trend Micro Alert Specifications Security Cameras Workplace Strategies Microchip Managed IT Internet Exlporer Software as a Service Buisness File Sharing Fraud Meta Dark Data How To IP Address Legal Username IT solutions Managing Costs Amazon Business Growth eCommerce Notifications Black Friday SSID Database Surveillance Travel Virtual Assistant Outsource IT Cortana Media Recovery Techology Google Maps IT Technicians Virtual Machine Environment Alt Codes Cookies Cyber Monday Medical IT Hard Drives Proxy Server Reviews Tactics Development Downtime Unified Threat Management Hotspot Transportation Small Businesses Domains Unified Threat Management Hosted Solution Mirgation Hypervisor Displays Shopping Typing Nanotechnology Optimization PowerPoint Refrigeration

Blog Archive