• Andres Hurtado Rangel

Google Docs Locking Users out of Files



A number of Google Docs users are getting an extra scare this Halloween. Reports have flooded in on social media with users complaining they are wrongfully locked out of their Google Docs files due to a violation of the Google Terms of Services. An error message pops up saying “this item has been flagged as inappropriate and can no longer be shared,” providing an option to request a review from Google or dismiss the error.

However, it appears to be a bug instead of an actual violation. According to the Google Docs Twitter account, they are aware of the issue and currently looking into the situation. A Google spokesman said they will provide more information when appropriate.

This issue is a great reminder that although your SaaS files are typically safe, they are not 100% protected from bugs, human error, and ransomware. Instead, the only way to guarantee your SaaS data is protected and accessible is with a third-party backup solution like Backup Cloud to cloud SaaS protection. Learn more today about how you can start protecting your cloud data.

How to Avoid CyberAttacks?

Employee Education: CYBERSECURITY 101 It's critical that your staff understands what ransomware is and the threats that it poses. Provide your team with specific learning experience examples of suspicious emails with clear instructions on what to do if they encounter a potential ransomware lure (i.e. don’t open attachments, if you see something, say something, etc.) see CYBERSECURITY 101 training program below

Security: Antivirus software is essential for any business to protect against ransomware and other risks. Ensure your security software is up to date to protect against newly identified threats. Keep all business applications patched and updated to minimize vulnerabilities.

Backup Disaster recovery: Modern total data protection solutions take snapshot-based, incremental backups as frequently as every five minutes to create a series of recovery points. If your business suffers a ransomware attack, this technology allows you to roll-back your data to a point-in-time before the corruption occurred. First, you don’t need to pay the ransom to get your data back. Second, since you are restoring to a point-in-time before the ransomware infected your systems, you can be certain everything is clean and the malware can’t be triggered again.

EmailSecurity: Use a real Cloud-based email security platform, a robust, secure, and legally compliant email encryption.

Quarterly Network Security Assessments: Did you know that most security vulnerabilities occur inside a business, behind the firewall? In fact, more than 70% of all cyber security incidents today are the result of INTERNAL security issues that no firewall, anti-virus or malware device could have prevented. schedule yours now.

To find out about cybersecurity and what SynerTech security team can do to fight back, Fill out the form here .

Contact us today for more information.

#DataProtection #disasterrecovery #education #DisasterRecovery

ABOUT
 

Company
Team
Careers

Blog

Policies

Partners

Investors

CLOUD SOLUTIONS
 

IaaS
Private Cloud Servers

BDR
Backup Disaster Recovery

Communications
Contact Center as a Service
SIP Trunking Always
UP

SECURITY

Email Security
Multi-factor Authentication

 

SUPPORT
 

HelpCenter
Feedback
Status Dashboard

ACADEMY
Create account

Cybersecurity101

Sign in

  • facebook
  • linkedin

Copyright © 2008-2020. All Rights Reserved.    |   SynerTech Solutions Group LLC .    | Privacy Policy