Just like that, one other month down.

In March, we introduced a slew of safety updates to Google Cloud, together with enhancements to G Suite. In a nutshell, G Suite firms can now use superior configurations to assist fend off phishing scams. These updates will proceed to assist companies block (ph)ishy exercise, like if an untrusted sender tries to share encrypted attachments or if somebody tries to trick you by sending info from a website that appears like yours.

With these protections in place, greater than 99.9 p.c of Business Email Compromise (BEC) eventualities—when somebody impersonates an govt to get delicate info—are mechanically moved to spam or flagged to customers as shifty. Sorry, Charlie.

We additionally mechanically enabled fundamental machine administration for cellular gadgets that entry G Suite. Now IT admins can higher implement cross codes, erase confidential information for Android and iOS gadgets with selective account wipe and extra with out customers needing to put in profiles. Lastly, we added IRM controls to Team Drives to stop of us from printing, downloading or copying recordsdata they shouldn’t have entry to.

Many of those protections are default-on, which implies you don’t need to do a factor. Read up right here, or get began utilizing the safety middle for G Suite.

ICYMI 2

This one is so easy. Did that you may make a duplicate of a Google Doc or Sheet with a fast URL change? In the URL of your doc, delete the data earlier than the ultimate backslash. In this case, change “edit” to “copy.” Done!

And since safety ought to all the time be prime of thoughts, brush up on how one can handle your share settings in Docs or different apps on our Help Center.

ICYMI 2
People predictions

→Most of us observe down recordsdata in Google Drive by looking for the title of the one who shared a file with us. Because of this, Drive goes to begin intelligently organizing the “Shared with Me” section by itemizing names and the recordsdata that individuals have shared with you, so you possibly can observe down recordsdata sooner.

→ Two-step verification is a simple and efficient approach to shield G Suite customers, which is why we suggest that companies use safety keys. Moving ahead, all G Suite admins—not simply G Suite Business admins—will have the ability to handle the deployment of safety keys and examine utilization reviews. Learn extra.

→ Now your jams in Jamboard will mechanically save to Drive.

Here’s a full rundown of product updates in March (PDF model).

This article sources info from The Keyword