All email is equivalent to sending a postcard. You can hand carry the postcard, you can give the postcard to a trusted courier, or you can send it in the mail. The delivery method does not change the fact that the message is written on a postcard. Google is acting like a trusted courier, which means that your postcard was sent using an encrypted channel to the Google servers.
Like most other mail services, Google does not provide a truly “secure” messaging system because the message itself is in clear text; in other words, it’s not encrypted. Unless you have taken measures to install and use a cryptographic system like S/MIME or PGP/GPG along with your email, the messages themselves are still vulnerable to eavesdropping, forwarding, and other issues. Google Apps is configured to require secure connections to email clients. Thus, Google Apps email is at least equivalent in terms of the security of message transmission from an email client to an email server.
Google’s data centers and operational practices are routinely audited and certified to meet industry standards for security and operational competence. In fact, Google is held to a higher operational standard than SIL.
Our agreement with Google states that Google will inform us in the event of such a request, unless the request includes a “gag order.” The same is true for us if we receive an information request from the government. In this case JARMail and Google Apps are equivalent.
"Data mine" is a loaded term and means different things to different people, usually negative things like targeted advertising or unwanted profiling. In this sense the answer is "No." The class of service we have from Google Apps does not include marketing ads and you will not see ads in the sidebar when using mail in Google Apps. The class of service we have comes with assurances that Google will not data mine in this sense.
Google will however scan email for spam and both email and documents for viruses and malware. Their systems will also index email and documents so that you can find things quickly. All of these things are for your benefit and are meant to improve your experience. All of this scanning and indexing is completely automated and does not involve a person at Google looking at your data. For more information see the Google Apps Privacy and Security Overview.
Our agreement with Google ensures that our staff members will retain sole ownership of their content on Google Drive and Docs
While that is certainly possible, the default access for each file is restricted to you alone. But you may adjust the access rules on a file by file basis. You may allow other named people to access a file (even people outside of SIL), you may open up access to all of SIL, or you may grant access to the world. The decision is yours.
Is it OK to share Google Drive files with a person using their consumer Gmail account (which is outside of the SIL Google Apps domain)?
Yes, but exercise caution when you share a Google doc with someone using their consumer Gmail account. Be sure you know the person with whom you are sharing your document. All the security created for SIL Google Apps accounts doesn't occur on consumer Gmail accounts. If you share a document with using their consumer mail account, this effectively removes these security measures and possibly makes the document accessible.
Consumer Gmail accounts are controlled entirely by the individuals who own them, without corporate oversight. With SIL Google Apps we can enforce password strength rules, and we can also enforce account disable and removal policies for people who are no longer entitled (for whatever reason), including removing access to SIL Google Drive docs.
It may actually be at less risk using Google Apps because you will be connecting to Google’s servers along with millions of other Google user and using servers geographically close to you rather than servers hosted at one of our centers, instead of the relatively small group of people in the world who used JARMail.
Every day, individuals and businesses alike are becoming victims of ransomware, a form of malware that captures your computer’s data and holds it captive until you pay the assigned ransom.
Even after you pay the demanded price, which can be pretty steep, there’s no guarantee that you’ll have all of your data returned to you. In 2016, ransomware attacks are happening more than ever, sparking the US Department of Homeland Security to issue an alert about the malware epidemic.
Ransomware is no longer just an issue for hardware devices. In fact, new strains of ransomware have launched that specifically target cloud-based applications, such as Google Apps and Office 365. One example of this cloud-targeting malware is called “cuteRansomware,” a form of ransomware that is quickly gaining speed. cuteRansomware infects the computer by launching itself from a Google Doc and holds the command-and-control functionality. Once you have accessed and downloaded the Google Doc that contains the cuteRansomware, it can collect user data while going unnoticed. While this is a recent endeavor of hackers, it’s an indication that cloud services will continue to be seriously affected by ransomware.
With Google Apps in particular, the risk is increasingly high because, by default, Google uses HTTPS to transfer data between a browser and the website to which it is connected. The way that cuteRansomware operates, it’s easy to bypass traditional security solutions like firewalls that would normally protect your data during the transfer. cuteRansomware is using Google’s own security against them to attain the data.
While this is a very serious threat, there are ways to protect against ransomware attacks. Netskope stresses “the importance of anticipating an attack by identifying where sensitive content is in the cloud and ensuring backups of those important files.” With a solution like Datto’s Backupify, a cloud-to-cloud backup and recovery platform for Google Apps that SIL Google Admin is looking at, ransomware is no longer a threat to your company’s data or security.
The Backupify solution has two features that help combat ransomware in particular. One of the features Backupify offers is a service called Point-In-Time Backup. PIT offers incremental backups that are taken frequently to create a series of recovery points. Backupify for Google Apps, for example, backs up your Google Apps data–including Docs, email, Drive, chat, Calendar, etc–a total of three times a day. Should your business get hit by ransomware at any point, you can roll-back your data to a point-in-time before the infection occurred. This way, you don’t need to pay the ransom to get your data back, and because you are restoring to a point-in-time before the ransomware infected your system, you can be certain everything is clean and the malware cannot be triggered again.
The second ransomware protection feature Backupify offers is an Unlimited Retention Policy, which allows users to store an unlimited amount of data in the Datto Cloud forever for a small incremental expense. How does this feature protect against ransomware? Because with unlimited data backup, you’ll always have a second copy of your data, thus never having to pay the ransom to get what could be your only copy back.
While ransomware is a serious and prevalent concern to the security of your business’ data, it is not the only threat. Do not let your company go unprotected, especially when there are solutions to prevent data security disasters.
Aside from a backup and recovery solution, the US Department of Homeland Security recommends the following to protect your business from a ransomware attack:
To learn more about ransomware and how you should be protecting your data, check out The Business Guide to Ransomware.
If you are interested in learning more about SIL's plan for Backupify, contact SIL Google Admin.
1. Overview >