Google protects 10,000 high-risk users with security keys

Google is providing security keys to 10,000 high-risk users of the platform for free. 
Google is providing security keys to 10,000 high-risk users of the platform for free. 

Google is giving out “Titan” USB security keys (retailing at US$41) to 10,000 of its users, free of charge. According to the tech giant, these users range from politicians and activists and are the most susceptible to attacks. By using one of the physical USB sticks, these at-risk users will be able to enable two-factor authentication, creating an additional layer of protection against attackers. This news follows shortly behind the tech giant’s warning email sent to thousands of Gmail users who hackers targeted.

At the end of last month, a campaign was sent to 14,000 Gmail users “across a wide variety of industries,” said Shane Huntley, director of Google’s Threat Analysis Group. Huntley cited the phishing campaign to come from a Russia-linked hacking group called APT28. “As we always do, we sent those people who were targeted by government-backed attackers warnings”, he wrote.

The rise of cyberattacks 

This news is unsurprising, given the astronomical rise in cyberattacks in the last 18 months. According to Statista, over 102.6 trillion emails are sent each year. Even with the rise of several new communication platforms, email remains at the heart of communication and cybersecurity risk. In Proofpoint’s report Reimagining Email Security, over 90% of cyberattacks begin with email. In 2020, attackers sent almost 60 million emails hosted via Microsoft Office 365 and sent just under 90 million via Google.

READ MORE:

Proofpoint’s The Human Factor Report confirms that over 99% of today’s cyberattacks are human-activated. To mitigate against this, Proofpoint emphasizes the need to know who an organization’s Very Attacked People (VAP) are, how they are targeted, and who are vulnerable to such threats. In addition, organizations need to focus on protecting four points of access: Email, Cloud, Users and Suppliers.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

How Predictive AI is Helping the Energy Sector

Colin Gault head of product at POWWR • 29th April 2024

In the past year or so, we have seen the emergence of many new and exciting applications for predictive AI in the energy industry to better maintain and optimise energy assets. In fact, the advances in the technology have been nothing short of rapid. The challenge, though, has been in supplying the ‘right’ data to...

Cheltenham MSP is first official local cyber advisor

Neil Smith Managing Director of ReformIT • 23rd April 2024

ReformIT, a Managed IT Service and Security provider (MSP) based in the UK’s cyber-capital, Cheltenham, has become the first MSP in the local area to be accredited as both a Cyber Advisor and a Cyber Essentials Certification Body. The Cyber Advisor scheme was launched by the Government’s official National Cyber Security Centre (NCSC) and the...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

How we’re modernising BT’s UK Portfolio Businesses

Faisal Mahomed • 23rd April 2024

Nowhere is the move to a digitised society more pronounced than the evolution from the traditional phone box to our innovative digital street units. Payphone usage has dropped massively since the late 1990s/2000s, with devices and smart phones replacing not only communication access, but the central community points that the payphones once stood for. Our...

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.