Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Gmail Incorporates More Stringent Phishing Protections (But There’s a Downside)

Gmail Incorporates More Stringent Phishing Protections (But There’s a Downside)

Since 2019, Google has had a feature built into their Chrome browser called Enhanced Safe Browsing. Intended to help prevent phishing attacks, this feature effectively steps in to warn users about links that it deems suspicious. More recently, this feature was added directly to Gmail. Let’s talk about how to enable it… and why you might actually want to think twice about doing so.

What is Enhanced Safe Browsing?

Originally, Enhanced Safe Browsing was a Google Chrome feature, and more or less warned users about links that the browser deemed suspicious in an attempt to help prevent malware, phishing, and other such threats. With email playing such a major part in so many phishing attacks, however, Gmail now hosts the feature natively.

With Enhanced Safe Browsing enabled, all links and attachments will be scanned and compared to Google’s database of known scams and malicious websites—a database that Google updates every half hour.

How to Enable Enhanced Safe Browsing

You’ll need to be logged into your Google Account to do this, and from there, access Security and from there, Manage Enhanced Safe Browsing to enable it. Doing so will activate it in Gmail, as well as any other Google software you use, including Chrome, down to the extensions and file downloads.

This is the big problem we’re concerned about.

Turning On This Feature is Effectively Gifting a Ton of Personal Data to Google

Reviewing what we’ve said thus far, this feature gives Google access to most of what most people use Google’s products for (particularly in the workplace) and insight into what they are being used for. To be fair, Google does claim that this data is anonymized after a short time, but studies have revealed that this anonymization isn’t perfect.

Ultimately, we wouldn’t recommend that businesses utilize this feature as compared to other options, and especially not as a replacement for robust and comprehensive user training and phishing awareness (after all, not all phishing attacks will come through Gmail exclusively), but it is ultimately up to you.

For other ways to help better secure your IT infrastructure, Voyage Technology is here to help. Reach out to us at 800.618.9844 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 September 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Small Business Quick Tips Backup Saving Money Cybersecurity Passwords Communication Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones Productivity Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office AI Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Automation Miscellaneous Gadgets Cloud Computing Information Holiday Covid-19 Remote Work Training Server Managed Service Provider Outsourced IT Employee/Employer Relationship Compliance Encryption Spam Office Windows 10 Data Management Business Continuity Government IT Support Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Augmented Reality Retail Storage Password 2FA Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Firewall Document Management Windows 11 Telephone The Internet of Things Scam Data loss Excel Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Free Resource Project Management Physical Security Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Money Saving Time Humor Managed IT Service Holidays Safety Maintenance Antivirus Sports Downloads Data Storage Mouse Licensing Supply Chain Video Conferencing Managed Services Provider Entertainment Administration Virtual Machines Professional Services Telephone System Robot Customer Relationship Management Cost Management Settings iPhone Printing Wireless Content Filtering Vulnerabilities Hacking IT Management Data Privacy Presentation VPN YouTube Meetings Cryptocurrency Images 101 Wireless Technology User Tip Modem Computer Repair Mobile Security Multi-Factor Authentication Processor Mobility Virtual Desktop Data storage LiFi Word Smart Technology Employees Outlook Integration Machine Learning Managing Costs Amazon Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure eCommerce Lithium-ion battery SSID Service Level Agreement Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Surveillance Virtual Machine Environment Superfish Bookmark Media Identity Theft Smart Tech Fun Twitter Alerts Reviews Medical IT Deep Learning Download Transportation Small Businesses Undo Error Development Hypervisor Displays Browsers Education Connectivity Social Engineering Break Fix Remote Computing Shopping Optimization PowerPoint Upload Employer/Employee Relationships Outsourcing Mobile Computing Social Network Multi-Factor Security PCI DSS Navigation Tablet IoT Search Dark Web Alert Gig Economy Workplace Application Best Practice Trends Teamwork Hiring/Firing Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Internet Service Provider Regulations Compliance IBM Legal Data Analysis Evernote Paperless IT solutions Star Wars How To Microsoft Excel Notifications Staff Memes Co-managed IT Business Growth Gamification SQL Server Technology Care Travel Social Networking Legislation Net Neutrality Financial Data History Techology Fileless Malware Business Communications Google Maps Cortana Wearable Technology Smartwatch IT Scams Alt Codes Content Azure Hybrid Work Competition Health IT Downtime Unified Threat Management Motherboard Comparison Procurement Telework Cyber security Unified Threat Management Directions Tech Human Resources Hosted Solution Assessment Permissions CES Communitications Cables Typing Network Congestion Specifications Supply Chain Management FinTech Google Drive User Error Microchip Term Google Apps User Internet Exlporer Knowledge Fraud Username IT Assessment IT Maintenance Value Business Intelligence Point of Sale 5G Black Friday Flexibility Experience Organization IP Address Google Docs Shortcuts Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Digital Security Cameras Smart Devices Ransmoware Remote Working Memory Vendors Google Wallet Proxy Server Cookies Monitors Cyber Monday Hotspot Data Breach Google Play Be Proactive Recovery Tactics Workforce Hard Drives Windows 8 Laptop Websites Mirgation Videos Electronic Health Records Wasting Time Threats Domains Drones Nanotechnology Electronic Medical Records Language Trend Micro SharePoint Security Cameras Workplace Strategies Addiction Meta Refrigeration Management Halloween Chatbots Software as a Service

Blog Archive