Google’s Safe Browsing Technology and Enhanced Item Validation Enforce Additional Safety Measures for Users In the wake of a sharp rise in cybersecurity concerns, Google is boasting new security measures and encouraging user awareness about online…

Google’s Safe Browsing Technology and Enhanced Item Validation Enforce Additional Safety Measures for Users

Share

ComputerworldIn the wake of a sharp rise in cybersecurity concerns, Google is boasting new security measures and encouraging user awareness about online threats and conscientious web-browsing.

Google’s Safe Browsing Technology has been curbing traffic to unsafe sites and educating its 1 billion users about potential security threats since 2006. Statistics into Safe Browsing Technology’s impact have been unpublished for years, but Google is now incorporating this data into their bi-annual reports for public access.

Computerworld’s recent article offers more insight into Google’s updated transparency report. The article addresses the predominant online culprits to which Google is curbing traffic: nefarious sites hosting malware and phishing scams. Currently, Google’s Safe Browsing efforts are detecting and redirecting users away from 10,000 newly discovered unsafe URLs each day.

Google’s security efforts extend further as Chrome developers unveiled Enhanced Item Validation for the Chrome Web Store last Wednesday.

The update serves as a security net which will scan newly published items before they become widely available in Google’s online marketplace. Most safe items will be published within a matter of minutes, and even in extremely rare instances, all content should be available in the store within an hour.

The Chrome Web Store is a popular vendor, but it isn’t the only place users can access unsafe or unwanted apps. Although Google Apps administrators can prevent the installation of applications from the Chrome Web Store, they cannot proactively monitor other sources of 3rd party apps, like the Apple (iOS) App Store, Android Marketplace or apps downloaded from public websites.

IT can control, CloudLock can control

CloudLock’s Apps Firewall bridges this gap in control, allowing administrators to scan for and detect all 3rd party applications that have been granted access to the domain via end-user installations. Applications that are deemed acceptable can be classified as “Trusted,” and those which are undesirable can be “Banned” and revoked if necessary.

Share
Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close