ELP Admin Partner CTL shares how to fortify your Google Workspace environment and safeguard your valuable information.
What you'll learn:
-Investigative tools. In Google Workspace logs, we dive deep into how to find abusive material and identify dangerous emails (@ 22:39).
- Driving Trust Rules. We focus on preventing data leaks, including limiting internal data sharing and reducing insider threats (@ 38:33).
- Context-aware access. To ensure the right people have the right access to Google Workspace resources, we highlight creating secure remote work and work from home protocols (@ 45:53).
- API access control. We highlight ways to ensure only authorized applications can access data, including securing data, preventing leaks, and controlling third-party app integrations (@ 56:17).