Security

Why is Google blocking some employees from accessing the network?

Why is Google blocking some employees from accessing the network?

pixabay.com

According to a document unveiled to the public by CNBC, Google is implementing an unusual initiative for the company.

In order to reduce the risks related to cyber attacks, the same has in fact strongly limited thenetwork access to some of its employees. According to the American portal, in fact, some employees of the Mountain View giant would have been targeted in the past by various cyber attacks.

Given the data processed by them and the accesses in their possession, this type of intrusion is potentially devastating for Google. Precisely for this reason the company would have acted by limiting online access from the desktop computers of part of its employees, limiting their range of action to internal websites.

Furthermore, for these employees, access to tools from the Google ecosystem would be guaranteed, such as Drive, Maps e Gmail. Beyond these freedoms, they would not be allowed to execute system commands or install software.

A drastic action by Google to protect internal systems and employees

Although this step seems to be reasonable, especially in light of the many threats present online, there are some reflections and possible controversies.

If one of Google’s priorities is to make information universally accessible, at any latitude, limiting some employees so severely could appear to be quite a contradiction.

On the other hand, as for any other user, the employees of such a giant also run risks. Activities such as spending time on social media or do Online shopping, constitute potential dangers not for the individual member, but for the entire company structure. According to CNBC’s report, Google initially selected 2,500 employees to participate in the pilot program to test this system.

In this regard, a spokesman for the company also expressed his opinion, confirming that one of the top priorities of the same is the safety of Google products and the users who use them. In this regard, this operation would be part of the internal prevention systems with respect to potential external threats.

Source: game-news24.com

Leave a Reply

Your email address will not be published. Required fields are marked *