Google Docs Goes Down
Google Docs users were unable to access their files earlier Wednesday due to an outage. Users were hit with a 502 error message, stating “the server encountered a temporary error and could not complete your request. Please try again in 30 seconds.”
According to the G Suite Status Dashboard, the outage was first reported at 3:48 PM ET and resolved by 5:10 PM ET. Google hasn’t revealed the total number of affected users or the cause of the outage.
Recently, Google Drive users experienced a service disruption when a bug locked users out of their files citing a Terms of Service violation. In both cases, this is a good reminder that your SaaS files aren’t totally protected from bugs in the applications, human error, and ransomware Instead, the only way to guarantee your SaaS data is protected and accessible is with a third-party backup solution like SynerTech's SaaS Protection. Learn more today!
How to Avoid CyberAttacks?
Employee Education: CYBERSECURITY 101 It's critical that your staff understands what ransomware is and the threats that it poses. Provide your team with specific learning experience examples of suspicious emails with clear instructions on what to do if they encounter a potential ransomware lure (i.e. don’t open attachments, if you see something, say something, etc.) see CYBERSECURITY 101 training program.
Security: To protect against ransomware and other risks, Antivirus software is essential for any business to Ensure you PREVENT, PROTECT AND DEFEND against ransomware and other risks. Ensure your security software is up to date to protect against newly identified threats. Keep all business applications patched and updated to minimize vulnerabilities.
Backup Disaster recovery: Modern total data protection solutions take snapshot-based, incremental backups as frequently as every five minutes to create a series of recovery points. If your business suffers a ransomware attack, this technology allows you to roll-back your data to a point-in-time before the corruption occurred. First, you don’t need to pay the ransom to get your data back. Second, since you are restoring to a point-in-time before the ransomware infected your systems, you can be certain everything is clean and the malware can’t be triggered again.
EmailSecurity: Use a real Cloud-based email security platform, a robust, secure, and legally compliant email encryption.
Quarterly Network Security Assessments: Did you know that most security vulnerabilities occur inside a business, behind the firewall? In fact, more than 70% of all cyber security incidents today are the result of INTERNAL security issues that no firewall, anti-virus or malware device could have prevented. schedule yours now.
To find out about cybersecurity and what SynerTech security team can do to fight back,