Researchers discovered that over 9,600 organizations misconfigured their Google Groups settings, which inadvertently allowed sensitive information such as email, user names, passwords, and company financial data to become searchable to the public. Organizations include Fortune 500 companies, academic and healthcare institutions, media stations, and several United States public agencies.
Google released a GSuite blog post reminding organizations to review their permissions and configure their Google Groups settings after security researchers notified them that discussions — such as customer support transactions and sensitive internal communications — were set to public and could be searched. Some sensitive messages were reportedly revealed after loading the organizations' public Google page and using search terms such as “password,” “username,” “accounting,” and “hr.” Other searchable items include internal organization resources such as manuals, schedules, and reports of applications problems and concerns.
Misconfigured shared user interfaces and cloud services some of the top causes for data leaks in the past year, and remain a concern for IT administrators. Settings left on default have led to accidentally exposed and downloadable databases, and cyberattacks such as spearphishing and BEC, among other forms of fraud. Here are a few best security practices:
- Review and configure the privacy settings of your discussion groups. Set to “private” all online forums involving internal communications and confidential processes; separate them from all public conversations open to customers.
- Practice data categorization. Limit the company personnel who can have access to classified information, as well as those who have monitoring and control on the corporate environment.
For GSuite customers and users, the Trend Micro Cloud App Securitysolution integrates directly to provide advanced malware protection and data loss prevention, ensuring the protection of confidential corporate information. Trend Micro Deep Security as a Service is a dedicated protection system optimized to reduce the strain on your business’ IT department and immediately secure your servers without the need for installations or configurations. Choose the cloud security appropriate for your needs.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Exposed Container Registries: A Potential Vector for Supply-Chain Attacks
- LockBit, BlackCat, and Clop Prevail as Top RAAS Groups: Ransomware in 1H 2023
- Diving Deep Into Quantum Computing: Modern Cryptography
- Uncovering Silent Threats in Azure Machine Learning Service: Part 2
- The Linux Threat Landscape Report