Google's Advanced Protection Cybersecurity Now Available to Nest Users

  • Google's had an extra-high level of cybersecurity that can be applied to people's accounts if they're particularly at risk of malicious hacking attempts or online attacks.

  • Google account signed up for both the Advanced Protection Program and for use as a Nest account in your smart home.

  • Nest devices and the Advanced Protection Program at the same time, tying up a feature that's apparently been heavily requested by the relevant users for some time .


Here's something you might now know - for a while now, Google's had an extra-high level of cybersecurity that can be applied to people's accounts if they're particularly at risk of malicious hacking attempts or online attacks. This covers professions like journalism, politicians, activists and election workers, among others, and has been around since 2017, giving people extra layers of security to ensure they're safe from attacks. It limits access to your Google accounts and services more rigidly than otherwise, to make sure that unauthorised processes can't get access. However, until now it's had a slightly annoying drawback. Namely, you couldn't have your Google account signed up for both the Advanced Protection Program and for use as a Nest account in your smart home.


Now, though, a blog post from the security team at Google has confirmed that users can use both Nest devices and the Advanced Protection Program at the same time, tying up a feature that's apparently been heavily requested by the relevant users for some time. That makes sense, at it's always annoying to be locked out of mutually useful services, not least when cyberattacks on people and organisations' smart devices are becoming more and more prevalent. Google has been beefing up security for its Nest devices in the last few months, leading up to this change, including the addition of reCAPTCHA verification layers to make it harder to people to spoof logins. All of which should hopefully serve to reassure anyone worried about security risks from their smart home.



Read more: GOOGLE TOP CHOICE FOR CYBERCRIMINALS FOR BRAND-IMPERSONATION SPEAR-PHISHING CAMPAIGNS

The scheme has been expanded to include additional Google services, including GSuite, the Google Cloud Platform, and the Chrome browser. In March, the tech giant expanded APP to cater to Android devices.

~ Google


The Advanced Protection Program was originally introduced to provide an additional layer of security for Google accounts considered to be at a higher risk of compromise or cyberattacks, such as those used by journalists, lawyers, political figures, and civil rights group members. Over time, the scheme has been expanded to include additional Google services, including GSuite, the Google Cloud Platform, and the Chrome browser. In March, the tech giant expanded APP to cater to Android devices. Previously, users were not able to connect their Google accounts to the APP program and Nest home devices at the same time. Seamless integration, therefore, has been constantly requested by users, the executive says.

Google's APP-Nest integration follows reports of vulnerabilities in Nest security cameras and device hijacking, including a case in Wisconsin involving a couple reportedly subjected to taunts made by a hacker through their Nest camera .


Google's APP-Nest integration follows reports of vulnerabilities in Nest security cameras and device hijacking, including a case in Wisconsin involving a couple reportedly subjected to taunts made by a hacker through their Nest camera. The introduction of the Advanced Protection Program to the Nest family also builds upon recent changes made by Google to try and bolster the security posture of its products. Google has already rolled out login notifications to Nest users to warn them when a login attempt has been made, and back in February, the tech giant rolled out two-factor authentication (2FA). Anyone that has not enrolled in the scheme or moved their Nest account to a Google account will need to perform extra security checks via email. reCAPTCHA Enterprise was also recently integrated with Nest accounts to mitigate the risk of credential stuffing attacks, in which stolen or easy-to-guess credentials are automatically applied to devices in order to hijack them.


When passwords are changed on Nest products, Google now also performs a search on behalf of users to see if they have potentially been exposed in third-party data leaks. Earlier this year, Google rolled out several new security features to Nest, including requiring two-factor authentication for users who had yet to migrate their Nest accounts to Google accounts. To enroll in Advanced Protection, users need two physical security keys — a main and a backup — and a phone running Android 7 or higher or iOS 10.0 or higher. Android users can enroll their phones and activate the built-in security key, while Apple users need to download the Google Smart Lock app. Even the most security-conscious users can be tricked by a sophisticated phishing attack. To protect you from this threat, Advanced Protection goes further than traditional 2-Step Verification. In addition to a password to sign in to your Google Account, it requires you to use either a physical security key


Read more: AI IS CRITICAL FOR AUTOMATION OF CYBERSECURITY THREAT DETECTION AND PREVENTION

Spotlight

Other News
Data Security

GuidePoint Security Announces Portfolio of Data Security Governance Services

GuidePoint Security | January 30, 2024

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, today announced the availability of its Data Security Governance services, which are designed to help customers address the challenges of unstructured data and data sprawl through a proven process and program to meet their unique needs. GuidePoint’s Data Security Governance services consist of policies, standards, and processes leveraging the newest technologies to meet organizations’ data governance goals in both on-prem and cloud environments. Once the right strategy is determined with the customer, GuidePoint Security consultants will review program requirements, assess current policies and controls, perform gap analysis, design and develop/enhance the program, recommend and implement supporting technologies, and create operational processes and metrics. “Whether an organization is just beginning to build their data security governance program or needs help assessing and improving an existing program, our team and service capabilities are built to meet them at their current maturity level,” said Scott Griswold, Practice Director - Security Governance Services, GuidePoint Security. “We work side by side with the customer to conduct the necessary data discovery in their environment and provide tailored recommendations for solutions and processes to ultimately build/improve upon the data security governance program.” GuidePoint’s Data Security Governance Services include: Sensitive Data Cataloging: For organizations just getting started in the process of protecting their sensitive data, GuidePoint offers Data Identification workshops to identify sensitive data types in the environment, including trade secrets, intellectual property, and sensitive business communications. Data Security Governance Program Assessment: For organizations with existing Data Security Governance or Data Protection programs, GuidePoint Security experts will assess the program to identify policy non-compliance, gaps in data protection requirements—whether legal, regulatory, contractual, or business—and program maturity levels. Data Security Governance Program Strategy Development: The GuidePoint team will work with an organization's key stakeholders to design a program strategy aligned with relevant requirements. The outputs of this effort include delivering ongoing sensitive data discovery, automated classification and labeling, the application of required sensitive data protections, restrictions on where sensitive data can be stored and sent, and data retention policy enforcement. Merger and Acquisition Data Identification: This offering provides the ability to identify sensitive data within an M&A target or recent acquisition (including locations, amounts, and access rights) and then perform penetration testing on the storage repositories where that sensitive data exists to determine the risk of data compromise. About GuidePoint Security GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions that minimize risk. Our experts act as your trusted advisor to understand your business and challenges, helping you through an evaluation of your cybersecurity posture and ecosystem to expose risks, optimize resources and implement best-fit solutions. GuidePoint’s unmatched expertise has enabled a third of Fortune 500 companies and more than half of the U.S. government cabinet-level agencies to improve their security posture and reduce risk. Learn more at www.guidepointsecurity.com.

Read More