Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google: “Cybersecurity is Easy, Just Block the Internet!”

Google: “Cybersecurity is Easy, Just Block the Internet!”

What measures do you take to protect your employees and business from the dangers found on the Internet? One major company, Google, is implementing some extreme measures to protect against online threats. In this pilot program, the Internet is simply not available to its workers. How is Google—a company notorious for its search engine and web-related technology—making do with minimal access to the Internet? The answer might surprise you.

The Answer: Internet-Free PCs

In reality, the idea that one of the biggest companies in the technology sector would disconnect its workforce from the Internet—although initially quite shocking and counterintuitive—actually makes more sense than you might at first realize. Considering the fact that major technology companies are often the targets of cyberattacks, as well as the fact that the data they house is monumentally important and valuable, it’s hard to imagine a world where Google would not want to do all that it can to keep itself safe from these types of hacks.

Even with all of the security measures in the world, Google could, of course, still fall victim to cyberthreats if one of their employees falls for it. Many cyberthreats target the weakest link in a company’s infrastructure rather than trying to crack through powerful security measures: the company’s employees. By blocking the Internet for many employees, Google can effectively prevent most phishing attempts that would be leveraged against them. This is especially important before implementing new tools powered by artificial intelligence or working with sensitive jobs funded by government contracts.

The Internet-free program piloted by Google involves its employees only having access to sites that are owned by Google itself—sites that are housed on an internal intranet. This means that they can still access their Google Drive, Gmail, and YouTube accounts. The program itself was implemented with the intention of being mandatory for a 2,500-employee sample, but it is now open to any who wish to opt in.

Theoretically, this program should reduce the threats that any involved employee comes into contact with, but it doesn’t completely eliminate them. Google’s employees will still be at risk of various phishing attempts that get around the need for an Internet connection, like those conducted through voice or text messages.

Will This Program Be Successful?

How employees respond to these limitations will ultimately speak to the success or failure of this program. Will it impact productivity? Will it sway their opinions of the workplace? Only time will tell.

We know that not all companies have the luxury of forsaking Internet connectivity for their operations and security, which is why we offer comprehensive technology solutions to help your staff be more secure and productive throughout the course of their workdays. Learn more by calling Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Communication Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones Data Recovery VoIP AI communications Mobile Devices Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Tech Term Network Remote Internet of Things Information Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Apple Networking App Mobile Device Management HIPAA Computing Applications Information Technology WiFi Access Control Office 365 Conferencing Hacker Avoiding Downtime How To Marketing BDR Operating System Router Virtual Private Network Risk Management Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Computers Storage Password Healthcare Bring Your Own Device 2FA Managed IT Services Website Vendor Management Solutions Cybercrime Physical Security The Internet of Things Display Printer Social Paperless Office Infrastructure Monitoring Document Management Customer Service Remote Workers Telephone Scam Windows 11 Data loss Cooperation Free Resource Excel Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Firewall End of Support Vulnerability Content Filtering IT Management Safety VPN Employees YouTube Meetings Integration Data Privacy Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Video Conferencing Outlook Customer Relationship Management Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Managed IT Service Hacking Presentation Maintenance Antivirus Sports Downloads iPhone Mouse Wireless Technology Licensing Vulnerabilities Entertainment Supply Chain Administration Images 101 Word Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Hosted Solution Assessment Electronic Health Records Entrepreneur Permissions Unified Threat Management Directions Videos Scams Hybrid Work Typing Wasting Time Network Congestion Specifications Security Cameras Human Resources Trend Micro Cables Undo Internet Exlporer Software as a Service Knowledge Fraud Google Drive User Error Microchip Username Managing Costs 5G Black Friday SSID Google Apps Point of Sale eCommerce IT Maintenance Unified Communications Database Surveillance Experience Virtual Assistant Google Docs Business Intelligence Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Shortcuts Application Cookies Ransmoware Tactics Development Hotspot Transportation Vendors IBM Windows 8 Laptop Websites Mirgation Hypervisor PowerPoint Drones Shopping Be Proactive Nanotechnology Optimization Workforce Addiction Electronic Medical Records Language Employer/Employee Relationships SharePoint Threats Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Lenovo Gig Economy Workplace Strategies Screen Reader Meta Competition Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Amazon Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Fun Superfish Bookmark Identity Theft Smart Tech Memes Outsource IT Deep Learning Download Net Neutrality Twitter Alerts SQL Server Environment Financial Data Media User Error History Social Engineering Break Fix Browsers Smartwatch Education Connectivity IT Small Businesses Upload Procurement Remote Computing Azure Displays IP Address Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Search Dark Web CES Tablet IoT Communitications Outsourcing Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Recovery Buisness File Sharing Regulations Dark Data Google Calendar Term IT solutions Star Wars IT Assessment How To Microsoft Excel Legal Data Analysis Workplace Hard Drives Hiring/Firing Domains Business Growth Gamification Flexibility Notifications Staff Value Legislation Organization Paperless Travel Social Networking Refrigeration Google Maps Smart Devices Cortana Techology Fileless Malware Digital Security Cameras Co-managed IT Technology Care Public Speaking Alt Codes Content Remote Working Wearable Technology Memory Comparison Google Play Lithium-ion battery Health IT Business Communications Downtime Unified Threat Management Motherboard Data Breach

Blog Archive