We will write a custom Report on IT Security in Google specifically for you
301 certified writers online
Organizations planning to use Google as their communication platform will experience a few challenges, that is, the policy is not meant to share the enterprise’s data with an employee’s data. Markedly, Google cannot detect the connection between a personal account and a user’s work or employment account. These two accounts remain autonomous from each other. On the other hand, organizations that use Google apps should ensure that they renew their contract with Google to avert situations of information leakage to third parties (Gross & Perez, 2012).
Some of the social media services from Google that my employees can use include Google Buzz and Google+. All these products are inbuilt in Gmail. Therefore, they are easily accessible under a single click. The employees must verify their email addresses in order to ensure high-level of privacy. Under Google+, employees will be able to learn how other firms operate in achieving their objectives. The company can opt to block employees’ personal accounts during their working time or within the organization. This policy will enable employees to remain focussed on meeting their goals, as there will be less obstruction at work.
Possible security risks that can emanate when using Google cloud services may prove impossible to control. For instance, the linking of people’s data to all websites will make it easier for cyber criminals or hackers to access these pieces of information at ago. Information storage in the cloud, clearly, allows hackers to delete or alter all information in a person’s accounts. A case example is Mat Honan who hackers got into his email and iCloud account. The hackers erased all back up information in the Cloud, information in his Apple phone, and even deleted his Twitter account (Fogarty, 2012).
From this point, electronic data can be used as evidence in a court of law even though they are highly prone to distortion (Cyber Forensics, n.d.). Data privacy in this digital era needs info security professionals who ensure that there is no access by third parties. Further, data are always stored in computers as caches or in the internet. Therefore, data exchanges over the internet are easily tracked as history and can be used as evidence against an individual. People should be very cautious with the manner in which they handle their information over the internet.
Cyber Forensics. (n.d.). Cyber Forensics. Web.
Fogarty, K. (2012, August 10). The Biggest Cloud Computing Security Risk Is Impossible to Eliminate. Network Computing. Retrieved from https://www.networkcomputing.com/careers-and-certifications/biggest-cloud-computing-security-risk-impossible-eliminate