• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
  • X
  • Facebook
  • YouTube
  • LinkedIn
Support
Screen Connect
Pay Online
SWK logo.

SWK Technologies

Software Solutions & Services

  • Accounting & ERP Software
      • Acumatica Cloud ERP
        • Overview
        • Construction
        • Distribution
        • Field Service
        • Financial Management
        • Manufacturing
        • Professional Services
        • Project Accounting
        • Retail-Commerce
      • Sage Intacct
        • Overview
        • Construction and Real Estate (CRE)
        • Distribution Operations for Sage Intacct
        • Financial Services
        • Healthcare
        • Manufacturing Operations for Sage Intacct
        • Nonprofits
        • Professional Services
        • Sage Intacct Payroll powered by ADP
      • Sage 100
        • Overview
        • Business Intelligence
        • Core Accounting & Financials
        • Distribution
        • Manufacturing
        • Payroll
        • Sage 100 Contractor
      • More Accounting Products
        • QuickBooks
        • Sage 50
        • Sage 300
        • Sage 500
        • Sage BusinessWorks
      • ERP Add-ons
        • ADP Workforce Now
        • Altec
        • Avalara
        • AvidXchange
        • BigCommerce
        • CIMCloud
        • Cloud Hosting
        • DataSelf
        • Fortis
        • FreightPOP
        • Microsoft 365
        • Netstock
        • Ottimate
        • Quadient
        • Sage Fixed Assets
        • Sage HRMS
        • Sage Intacct Payroll powered by ADP
        • Savant WMS
        • Scanco
        • ScanForce
        • Solver
        • SPS Commerce
        • Velixo
        • Workforce Go!
      • More ERP Add-ons
        • Bizinsight
        • Concur
        • Crystal Reports
        • Fraxion
        • Fusion RMS
        • FYISoft
        • JobOps
        • KnowledgeSync
        • Lockstep Collect
        • Nectari
        • Pacejet
        • Planning Maestro
        • Sage CRM
        • Sage Intelligence
        • Scissortail HCM
        • Service Pro
        • ShipStation
        • Shopify
        • Starship
        • Sugar CRM
        • Time & Billing Pro
        • Timekeeper
        • True Sky
      • Industries
        • Construction
        • Distribution
        • Financial Services
        • Healthcare
        • Manufacturing
        • Nonprofit
        • Professional Services
        • Retail
  • Managed Cloud Services
      • Managed Services
        • IT Support
        • Cloud Hosting
        • Infrastructure-as-a-Service
        • Managed Cloud Services
        • vCIO
        • Acumatica Infrastructure
      • IT Solutions
        • Backup & Continuity
        • Cybersecurity
        • Email Hosting
        • Microsoft 365 Services
        • Virtualization
      • Industries
        • Financial Services
        • Healthcare
  • Consulting & Implementation
    • Business Technology Consulting
    • eCommerce
    • Financing
    • Human Capital Management
    • Managed Cloud & IT Services
    • Partner Program
    • Software Development
    • Software Implementation
  • Resources
    • Help Desk
    • Blog Posts
    • Payments Portal
    • Webinars
    • YouTube Channels
    • Acumatica Resources
    • Sage Intacct Resources
    • Sage 100 Resources
    • IT Resource Pages
  • About
    • About SWK
    • Awards & Recognition
    • Life@SWK
    • Careers
    • Success Stories
    • SWK Gives
  • Contact
    • Contact Us
    • Support
    • Our Locations

Google Prevents Phishing with Security Keys

October 14, 2019 by Hector

Home » Blog » Google Prevents Phishing with Security Keys

Since 2017, Google has employed a currently full-proof method for ensuring its employees do not get phished: physical security keys. All 85,000 personnel employed have been required to utilize USB-based authenticator devices for the past few years. Google claims that since implementing the policy, there has not been a single instance of a successful phishing attack.

“We have had no reported or confirmed account takeovers since implementing security keys at Google,” said a spokesperson for the company. “Users might be asked to authenticate using their security key for many different apps/reasons. It all depends on the sensitivity of the app and the risk of the user at that point in time.”

The Security Keys used by Google are similar to flash drive memory sticks in that they are designed to be plugged into a USB port. Once inserted, the user simply has to press a button to complete their login. As opposed to the multi-step process in two-factor authentication, Security Keys utilize what is called “Universal 2nd Factor” (U2F) that does not require any extra processes or special software drivers to approve access.

Phishing attacks generally either deliver malware through links to an infected landing page or prompt the victim to submit their credentials. In the latter case this information is sought for the purposes of identity theft or to gain access to more valuable data in the case of corporate passwords. Technology entities such as Google are a prime target for such attacks and tech employees surveyed previously have displayed a susceptibility to phishing, along with those of manufacturing and insurance companies.

 

Two-factor authentication has been increasingly adopted by businesses seeking an extra layer of protection for their physical interfaces. They require users to carry out a second step for logging into the system after they have submitted their password. These vary from push notifications to automated phone calls. However, research has shown that SMS notifications contain loopholes that still allow them to be retrieved by hackers, negating the additional security.

One of the best ways to prevent phishing is to create and enforce cybersecurity best practices in the workplace. Employee awareness can be just as valuable (if not more so) as applying technology solutions to meet evolving trends. Phishing attacks rely foremost on ignorance, distraction and trust to successfully penetrate your network, so ensuring that everyone in your organization knows what to look for should be your first and last line of defense.

Sign up for our Phishing Defender service to get access to training and resources that will prepare you for the next attack.


[fc id=’34’][/fc]

Category: Blog, Cybersecurity, IT Services

Sidebar

Recent Posts

  • Acumatica Cash Management: Training Guide
  • 1099 Processing in Sage Intacct: A 2025 How-To Guide
  • How MSPs Solve Healthcare’s Critical Technology Challenges with IT Support
  • Sage Intacct 2025 R2 – A Complete Update Guide
  • Sage 100 Favorites – How to Guide
  • Sage Copilot: Enhance Accounting and Financial Management with AI
  • SWK Technologies Named to CRN Solution Provider 500 List for 2025

Categories

Ready to take the next step?

Contact SWK today to get in touch with one of our experts. We’ll go over your business challenges and unique needs, and see where you can unlock new value from your technology and make your operations run easier.

Get in touch!

Our Latest Posts

Acumatica Cash Management Preferences configuration screen showing auto-matching settings, posting options, and available balance controls for bank reconciliation setup.

Acumatica Cash Management: Training Guide

Read moreAcumatica Cash Management: Training Guide

1099 Processing in Sage Intacct: A 2025 How-To Guide

Read more1099 Processing in Sage Intacct: A 2025 How-To Guide
IT support for healthcare

How MSPs Solve Healthcare’s Critical Technology Challenges with IT Support

Read moreHow MSPs Solve Healthcare’s Critical Technology Challenges with IT Support

Awards and Accreditations

Top work places in NJ 2020.
Acumatica the Cloud ERP gold certified partner.
The Gold Microsoft partner logo on a black background.
Sage business partner diamond logo.
Dell Technologies Gold Partner
Sage tech partner logo.

Stay in the know!

Subscribe for exclusive ERP, process automation, IT and cybersecurity news.

Twitter
  • Facebook
  • YouTube
  • LinkedIn

Home
About
Contact

Support
Screen Connect
Pay Online
Downloads

SWK logo.

Headquarters:
120 Eagle Rock Ave, Suite 330
East Hanover, NJ 07936

Contact:
info@swktech.com
(877) 979-5462

Copyright © 2025 · SWK Technologies, Inc. · All Rights Reserved · Terms of Use · Privacy Policy

This site uses cookies to collect information about your browsing activities in order to provide you with more relevant content and promotional materials, and help us understand your interests and enhance the site. By continuing to browse this site you agree to the use of cookies. Visit our privacy policy to learn more.I understand