- Informazioni sulla sicurezza
- Virtualization & Cloud
- Organizations’ Misconfigured Google Groups Settings Leak Credentials, Data
Researchers discovered that over 9,600 organizations misconfigured their Google Groups settings, which inadvertently allowed sensitive information such as email, user names, passwords, and company financial data to become searchable to the public. Organizations include Fortune 500 companies, academic and healthcare institutions, media stations, and several United States public agencies.
Google released a GSuite blog post reminding organizations to review their permissions and configure their Google Groups settings after security researchers notified them that discussions — such as customer support transactions and sensitive internal communications — were set to public and could be searched. Some sensitive messages were reportedly revealed after loading the organizations' public Google page and using search terms such as “password,” “username,” “accounting,” and “hr.” Other searchable items include internal organization resources such as manuals, schedules, and reports of applications problems and concerns.
[Read: Securing data through network segmentation in modern enterprises]
Misconfigured shared user interfaces and cloud services some of the top causes for data leaks in the past year, and remain a concern for IT administrators. Settings left on default have led to accidentally exposed and downloadable databases, and cyberattacks such as spearphishing and BEC, among other forms of fraud. Here are a few best security practices:
For GSuite customers and users, the Trend Micro Cloud App Securitysolution integrates directly to provide advanced malware protection and data loss prevention, ensuring the protection of confidential corporate information. Trend Micro Deep Security as a Service is a dedicated protection system optimized to reduce the strain on your business’ IT department and immediately secure your servers without the need for installations or configurations. Choose the cloud security appropriate for your needs.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.