Categories
Blog File Server Security

Secudrive File Server: A File Server Data Loss Prevention with Digital Rights Management

Most organizations have file servers: Even small ones usually have at least one file server. However, larger ones have multiple file servers for teams or task-forces. File servers are storing sensitive files such as customers’ privacy, proposals for bids, drawings for new product development, and, etc. multiple users such as employees, consultants, contractors, partners share the information. Therefore, it is imperative to establish and manage an intricate and assured security system to prevent both accidental and intentional data leaks.

Secudrive File Server manages user rights by using Data Rights Management (DRM) technology to prevent data loss from the Windows file server. Even though a user has permission to access a file server, Secudrive File Server makes it possible to prohibit the user from copying or transferring a file from the server to anywhere out of the server. It whitelists applications to use specific applications and not to use an unknown one on the file server so that it can protect file server data from a ransomware attack. It filters file activity logs by users so that it can enable an administrator to monitor user activities at a glance and to use them for post-audit. It can be installed on an existing file server keeping existing Windows Active Directory(AD) environment so that existing shared folder, user, group, and permission can be utilized without any additional operation. Finally, it supports Microsoft Distributed File System(DFS) to manage remotely and collectively scattered multiple file servers in an organization.

Data loss prevention using DRM. Secudrive File Server can restrict user rights for copy, print, screen-capture, and network-transfer which cause data leakage from a file server. It can block all ways relating to copy such as ‘copy and paste,’ ‘save as,’ ‘clipboard copy’ as well as general ‘copy.’ Clipboard copy on a file server can be exceptionally allowed for productivity. Print can be prohibited, or only water-mark printing can be allowed for post-audit. If screen-capture is blocked, not only ‘print screen’ as a basic function of Windows but also screen capture trial by using a third-party sniffing tool does not work. Finally, it can also prohibit network-transfer by using ‘copy to web’ which can copy to the public cloud like ‘OneDrive.’

Ransomware attack prevention using application whitelisting. Prohibiting user rights using DRM technology works only if a user uses specific applications which are supported by Secudrive File Server. Secudrive File Server offers supportive applications including computer-aided design(CAD) files as well as various Office files, and then an administrator can whitelist apps among the list. By doing so, other applications including ransomware except the whitelisted are blocked from being installed and run on the file server so that the file server can be protected from ransomware attacks. An administrator also whitelists domains, IPs, and ports for network-transfer, if he/she enables a user to save a file onto groupware in the intranet.

User and file activity log monitoring. An administrator can monitor detailed file activity logs on when a user creates, modifies, deletes, copies, prints, screen-captures, and network-transfers a file as well as user activity logs on when and where a user accesses a file server. If file transfer out of the file server is allowed, the transferred file can be automatically backed up, and the log can be left for post-audit.

Easy installation and operation while keeping the existing system. Secudrive File Server can be added to the existing file server(s) keeping existing settings relating to information on users, folders, groups, and permissions. Secudrive File Server shows existing shared folders and enables an administrator to choose one among them and change it to ‘a secure shared folder’ on which DRM policy for users can work. Secudrive File Server also provides an easy user interface to add, modify, and delete a user, a folder, a group, and permission in an administrator’s console.

Compatible with enterprise environment. Secudrive File Server is compatible with AD environment so that existing AD environment can be maintained without any modification. It supports Windows Distributed File System to remotely and collectively manage scattered multiple file servers at a glance in large organizations.

Secudrive File Server could be an easy and efficient data loss prevention solution for a file server(s) with DRM technology so that it can make file server(s) a secure cooperative workspace for enterprises by protecting data from insider threats as well as outside attacks. Secudrive provides more detailed information and 30-day free trial of Secudrive File Server from its website.

Categories
Blog File Server Security USB Sescurity

File Activity Monitoring in a File Server

In many businesses, a great deal of confidential information is stored in a file server or a Network Attached Storage(NAS) and shared by employees, contractors, consultants, and business associates. Although we easily share files in shared folders to work together, the management may often worry that a confidential file can be modified, deleted, or even copied by an unauthorized person because of somebody’s mistake or malicious actions.

We usually control users’ access rights first to prevent unauthorized access to a shared folder and then give read-only or read/write permission to users who have access rights to the folder. But users are sometimes given access rights and permissions in exceptional cases, and often, these are not taken back. If this happens repeatedly, things can get messed up. Ultimately, access control and permission management efforts are often given up.

Finally, we look for file activity log features. We try to monitor who creates, modifies, copies, and deletes files and when, because we believe we can detect unauthorized or suspicious activity when a user tries to do so. And users who recognize that their file activity is always monitored can also proactively protect themselves from unauthorized and suspicious actions. File activity log monitoring is more useful in small- and medium-sized businesses where there is no dedicated administrator for a file server.

Of course, there is a log management feature that is provided as a default option by Windows file servers. However, if you set up some options to generate file activity logs, you will find tons of logs, struggle to sort what you really want out of them, and finally end up in big trouble with storage capacity management for the huge logs. This is why some expensive third-party log management solutions for Windows file servers are successful in the market.

Secudrive File Server shows at a glance file activity logs on users who create, read, modify, copy, and delete a file. Customers say that Secudrive File Server’s file activity log feature is useful enough to monitor users’ file activity in a file server without opting for any expensive log management solutions.

Secudrive File Server is basically a data leakage prevention solution for Windows file servers. Secudrive File Server makes it possible to manage users’ rights for copying, printing, screen capture, and network transfers of files from shared folders, while keeping existing shared folders and users’ access rights and permissions in existing Windows file servers. If we block users’ rights to copy, print, screen capture, and network transfer in shared folders and keep all confidential files in the shared folders through their life cycles from creation to deletion, we can completely prevent data breach from the folders.

Secudrive File Server can be utilized differently according to customers’ situations: 1) if users’ rights do not need to be changed often, their rights to copy, print, screen capture, and network transfer are all blocked, and all file activity logs are monitored. This is the most secure option. 2) If users’ rights need to be changed often and there is no dedicated system administrator, we can utilize the file activity monitoring feature for audit as a minimum safeguard to prevent data leakage from a file server instead of blocking all of the users’ rights.

When a user transfers a file from a file server to outside, the Secudrive File Server can back up the file in a certain storage area for audit, encrypt the transferring file, and let it be decrypted only in a copy-protected device such as another file server that has installed Secudrive File Server or a Secudrive USB flash drive.

Categories
Blog File Server Security Insider threats

The final step of file server security: prevention of copying a file from a file server

Important unstructured data concerning accounting, product development, and marketing are stored in file servers in organizations. Users share the data using shared folders on file servers. File server security is crucial because organizations could lose intellectual property and be damaged in terms of business continuity and reputation if the data is lost or leaked from a file server due to disaster, error, or external attack.

The following should be done to secure file servers: 1) keep file servers in a secure place to prevent theft, 2) separate file servers from the Internet to prevent cyber-attack, 3) encrypt file servers using Bit Locker to prevent data leakage in case of theft or loss, 4) keep Windows file server software updated to maintain up-to-date security patches, 5) install anti-virus software to prevent malware, 6) control access and privileges of users, 7) regularly back up file servers, 8) whitelist applications in a file server to prevent ransomware, and 9) audit the file logs of users.

However, existing file server security solutions have mostly concentrated on preventing attacks from the outside and lack focus on preventing insider threats to file servers.

Theoretically, we can audit files a user copies or transfers outside the server through logs provided by the Windows file server; however, in reality, if the options are set to create logs, tons of logs can be created. Accordingly, it is very hard to figure out which log is useful, and log data management can be another bothersome job, which is why many expensive third-party file server audit software applications for sorting, managing, and monitoring logs are needed.

We can manage users’ permission as ‘read only,’ ‘write,’ ‘modify,’ etc. However, we cannot prevent a user from copying a file to the outside, even by assigning the ‘read only’ permission to a user. As a user’s permission provided by Windows, ‘read only,’ only makes it impossible to modify the original file with the same file name. If we rename it, we can modify and copy it as well. However, when it comes to file servers, as an important collaborative workspace in organizations, more features relating to insider threat prevention are needed for more than permission management. It should be possible to prevent users from copying, printing, screen-capturing, and network-transferring files, even when they can edit the files.

Secudrive File Server prevents users from copying, printing, screen-capturing, and network-transferring a file in a shared folder of a file server, even when users can edit the file. Moreover, it makes it possible to filter and sort when and where a user can create, modify, copy, transfer, and delete a file, making it very useful for auditing as well as real-time monitoring. Secudrive File Server can keep file servers secure as a collaborative workspace from insider threats and can be considered the final step in file server security.

Categories
Blog Device Control File Server Security Insider threats USB Sescurity

How to Prevent HIPAA Data Breach by Insiders

The most frequent cause of health data breach accidents is an insider. About half of these accidents are a result of an error by insiders while the other half are a result of wrongdoing. Obviously, we should prevent accidents by both causes. (Read: Insiders: the Most Frequent Reason for HIPAA Data Breach)

First, health data should not be stored in scattered PCs, but should be stored separately from other data in a securely reinforced storage computer. This has a decided advantage to keep not only confidentiality but also integrity and availability, which are required in the security rules of HIPAA.

A file server could be a good option, after it is reinforced with some actions, as follows. Access to and permission to edit the data should be controlled. File versioning is needed to keep data integrity against intentional alteration or deletion of the data. The data should be backed up in real time or regularly to keep data availability. And finally, the network for storage should be separated physically/logically and encrypted to protect against attack from outsiders.

Secudrive File Server makes it possible to manage users’ rights of copying, printing, screen capturing and network transferring to use files in the file server. File activity logs are monitored at a glance and stored in real time so that they could be very helpful for audits. When data is transmitted to the outside, it provides encrypted data transfer under approval by the authority. In addition, whitelisting to enable specific applications to be used in the server can protect the data against attack by ransomware.

When data needs to be taken outside using a USB flash drive, Secudrive USB could be used to prevent users from unauthorized copying, printing, screen capture or network transfer of data on the USB flash drive to others, even in an ‘out of sight’ environment. Usage logs are gathered and monitored in real time through the network. When offline, the logs are gathered in the secure zone of the USB flash drive. When it comes back to the office, an administrator can view what the user had done with the USB flash drive. If the USB flash drive is stolen or lost, the data on it can be destroyed remotely. Of course, the USB flash drive is hardware encrypted, requiring a password to see the data. Secudrive USB Management Server provides a central management environment to manage the security policy of scattered USB flash drives and to monitor their real-time usage.

Because external hard drives, USB flash drives, and smartphones can be connected to PCs through USB ports, they could be used to take data from a PC. Secudrive Device Control can block the USB ports, ensuring that only secure USB Flash drives like the Secudrive USB flash drive can be used. For a coworker off site, an access-controlled account can be made for him/her in the file server to share files. This is much more secure than using email or public cloud service to share data.

Finally, educating insiders about security should be a top priority to prevent health data breaches by insiders. Data should be classified to be kept secure and access and rights to classified data should be allocated to the right persons. Administrative works should be done and updated regularly. In the ongoing administrative process, Secudrive could be an easy and cost-effective solution for small and medium healthcare organizations to mitigate the risk of a data breach by insiders in accordance with the technical safeguards of the security rules of HIPAA.

Blogs relating to HIPAA

Data Destruction for HIPAA Compliance
Insiders: the Most Frequent Reason for HIPAA Data Breach
the Costs of Data Breaches and Violation against HIPAA
The Primary Threats to Data Breaches of Protected Healthcare Information(PHI)
The Three Safeguards of the HIPAA Security Rule Summarized

Categories
Blog Device Control File Server Security Insider threats

Insider Threat Prevention Using a File Server in an SMB (Small & Medium Business)

One possible alternative for resolving data security and management issues in a distributed data environment is the VDI (Virtual Desktop Infrastructure). In a VDI environment, the insiders’ PC functions as a terminal with which to work with data stored on servers. Insiders’ PCs don’t have any data stored on them, thus providing a significantly enhanced level of information security for enterprises. System administrators can focus on server management, while insiders are responsible for managing what happens on their own PCs.

However, the VDI environment is quite unlike the typical PC environment, and being so unfamiliar to most of us, we would likely need the help of VDI specialists to introduce and manage it. Furthermore, a VDI environment costs about twice as much as a standard PC environment because the software licenses for servers which are not required in PC environments can be quite pricey. Consequently, many companies, especially SMBs, are often reluctant to introduce VDIs despite their obvious advantages in terms of information security and management.

A file server solution represents a reasonable alternative to a VDI. In this solution, all corporate data is stored on a file server, and an administrator focuses on the server to enhance the level of security and to facilitate asset and data management. With all corporate data now stored on the file server, all activity log files from creation to deletion can be gathered quickly, and individual access authority can be managed collectively. Moreover, if the file server has a backup system, data loss due to inadvertent or malicious deletion by insiders can be prevented. Ransomware attacks can also be prevented through the use of whitelisted corporate applications. Of course, the file server should be encrypted and equipped with antivirus to prevent attacks from outside, too.

All file activities should be executed on the server, and all users should be restricted from copying and network transferring a file to outside the file server, thus preventing data leakage. A watermark or print prohibition feature could be useful in preventing data leaks through printing. If a file server is equipped with such DRM features, it can effectively prevent insider threats. In sum, there is a range of data and network security features available with a file server solution, thus negating the need for a VDI.

Categories
Blog File Server Security

4 Actions to Prevent Ransomware Using a File Server in SMBs

Small and medium businesses (SMBs) cannot be exempt from ransomware attacks. However, they cannot afford to follow the general recommendations to prevent ransomware attack due to lack of budget and human resources. While big enterprises have their own dedicated IT security teams, SMBs are mostly defenseless to ransomware attacks. However, we suggest the following four actions to easily prevent ransomware using a file server in SMB.

First, corporate data should be isolated from employees’ PCs and consolidated into a file server. The file server should be utilized as a corporate secure work space in which all files are created, edited, shared and deleted. Ideally, there should be no corporate files in employees’ PCs. It will be much easier for an administrator to focus on managing one file server than hundreds of PCs. Then business continuity can be maintained even if a PC is affected by ransomware.

Second, the file server should be carefully managed under the recommendations for file sever security such as physical separation, encryption, vaccination and log monitoring. In addition, it would be safer if there is file versioning and rights management for copy to prevent insiders from inadvertently or maliciously deleting and copying.

Third, the file server should be a high availability system or backed up to maintain business continuity. It is apparently more effective than backing up individual PCs in terms of cost, traffic and management.

Fourth, available applications in the file server should be whitelisted because sometimes a file server can be consequently infected after ransomware is installed in a shared folder.

Secudrive File Server is an easily applicable solution for SMBs to consolidate corporate data and protect against ransomware as well as insider threats.

Categories
Blog File Server Security Insider threats

3 Ways SECUDRIVE is a Better Alternative to Google IRM in an Enterprise Environment

Though I have found that Google’s IRM has some good features such as its abilities to block exporting, copying, and printing for Google App files, I have also found a few weak points that would not make it the best option in an enterprise-level setting [Previous Post: 4 Reasons Why Google IRM is Not Enough for Corporate Use].

SECUDRIVE File Server (FS) can create a secure collaborative enterprise environment and I have listed what I thought are the top 3 ways FS can be a better alternative solution to Google IRM.

Simplified Management and Implementation
While Google IRM uses a file-by-file management system, FS simplifies management by utilizing a folder-based system. I find that it is much easier to manage a few folders than a few hundred files.

Instead of having the user be responsible for setting the IRM settings, FS has all security settings applied by a security administrator. This gives users one less thing to worry about when sharing files and puts the responsibility of security in the hands of someone qualified to handle it. Personally, I wouldn’t want to have 100 separate users responsible for my data’s security because that is 100 more opportunities for data to be leaked.

The solution can also be applied to a Windows file server and use the preexisting Active Directory, users, groups, permissions, and shared folders for a hassle-free implementation. FS extends to the cloud as well and can be implemented onto cloud servers such as Amazon AWS EC2 with Windows Server in order to allow users to access data in a protected state while out of the office network.

Wide Variety of Protected Applications
Since Google IRM is mainly focused on protecting Google App files, in order for me to truly get the full extent of the security, I would have to convert my Microsoft Word documents, Powerpoint presentations, and Excel files to their Google Apps counterparts. I don’t know about you, but that is a lot of files I would have to convert.

With FS, I do not have to convert anything so I can maintain the overall workflow for myself and my team by using our normal applications such as Microsoft Office Suite. It also supports other applications such those in Adobe Creative suite, as well as an array of video players, photo viewers, and standard Windows applications such as Notepad. FS is also versatile with its protected applications so, for example, it can protect a manufacturing company that may have CAD-based product designs files and layouts in AutoCAD and CATIA as well. This versatility can help keep business as usual in multiple types of environments.

Protected Editing
My biggest disappointment with Google IRM was the lack of protection for editors since the simultaneous collaborative functions were, in my opinion, the most useful feature of Google Apps. So it creates a situation where has to choose between collaborative editing and IRM security.

In contrast, the rights management feature of FS extends to users that have read/write access. They will not be able to copy, print, screen capture, or transfer any files out of the protected shared folders but will still be able to edit and work as normal. I can also select which rights I want to block individually on FS whereas Google IRM is only one option to block exporting, copying and printing altogether.

I should mention that I have only outlined a few features of FS in comparison to Google’s IRM because the entire FS solution comes with many other security features such as real-time monitoring, detailed logging, DFS and WSFC compatibility, Addition of file linking for Windows Servers, and encrypted file export to SECUDRIVE manageable USBs.

So if security is your main concern when sharing your organization’s files, then SECUDRIVE File Server would be a better alternative to help mitigate the intrinsic risks associated with file sharing.

Click here to ask us more about our SECUDRIVE File Server Solution

Categories
Blog File Server Security Inside Story Insider threats NEWS

4 Reasons Why Google IRM is not Enough for Corporate File Sharing

Google has implemented a new security feature in order to allow file owners to control whether or not the users for shared files can copy, print, or export them on Google Drive. I wanted to explore the usability of Google’s IRM feature within a corporate environment to see if it could help to prevent data leaks caused by insider threats from employees, as well as data leakage threats from partners, and third-parties. If the feature is sound, it could be a convenient method of safely sharing data since Google is linked up with many useful applications.

Unfortunately, upon further investigation and usage of Google’s IRM, I found that it was a good feature in some aspects but not quite good enough to be suitable for corporate use.

Here are my four reasons why I believe it is not well suited for corporate file sharing.

Rights Management Concerns
There were two key issues with management of the Google IRM feature. The first is that the IRM features are set file by file making it a big headache for any security administrator. Imagine managing just 20 users and each of them made just 1 file per day. This is around 600 files per month that they would have to try and manage. Now imagine that on an enterprise scale. That would be thousands of file daily.

IRM is also set by the file owner instead of the security administrator. It basically leaves each employee in charge of the security of each individual file leaving you highly vulnerable to employee-related data leaks.

Collaborative Editing or IRM
Personally, I find that the collaborative editing is one of Google Apps’ best features so you can imagine my disappointment when I found that the IRM doesn’t extend to editors.

Google’s IRM is only applicable for users with read or commenter access rights (Previous Post: Top 3 Things to Know about Google’s Information Rights Management (IRM)) meaning I ultimately have to choose to have IRM security without the ability to edit or have the convenience of collaborative editing without IRM security. Why can’t I have both?

Google Apps Only
The Google IRM is mostly centered on protecting Google App files and for all other files in Google Drive, the functionalities are limited. For non-Google App files, the IRM only removes the options for copying, exporting, and printing but content can still be copied using clipboard copying. So, Google IRM is not a viable option for confidential data. Also, since many of my organization’s files are from Microsoft Office as well as other standard applications such as those from Adobe Creative Suite, a large majority of my files will not fall under the full protection of Google’s IRM.

Lack of Compatible Protected Applications

As previously mentioned, Google IRM is focused mainly on Google App files, so it leaves the large majority of my other files to fend for themselves. The only files that I could protect are Microsoft Office files but they would have to be converted into Google App files in order for me to get the full protection.

I personally share a lot of Adobe Illustrator, Photoshop, and Premiere files for marketing content on the website. These files do not have a Google-App counterpart and cannot be used within Google’s browser-based platform. So essentially, the feature provides very little usability and security for myself and my team.

For other organizations, I can see this being an even larger barrier. For example, R&D for a manufacturing company could need protection for their AUTOCAD files, website developers could need protection for their HTML files, or a gaming software design company would need protection for their source codes.

Google IRM’s Role and an Alternative Solution
Google IRM could be a good start to trying to protect you from data leaks caused by your own employees and colleagues. As it is now, it doesn’t seem good enough to be used in a dynamic enterprise-level environment. But if you want to create a more secure environment that is convenient and better suited for the enterprise, we have a solution that would be able to allow for secure file sharing within file servers and the cloud by using advanced rights management technology. [Next Post: 3 Ways SECUDRIVE is a Better Alternative to Google IRM in an Enterprise Environment]

Categories
Blog File Server Security Inside Story Insider threats NEWS

Top 3 Things to Know about Google’s Information Rights Management (IRM)

Google Apps for Work released a security feature last July which enables the owner of a document to disable the download, print, and copy functions for Google App files using Information Rights Management (IRM).

I was excited to see that Google was looking more into rights management solutions as it is not a common feature in most cloud service solutions. As I mentioned in one of my previous posts (Link: 5 Security Concerns when using Google at Work), I use Google Apps for work regularly so I was eager to test out the IRM functionality and implement it within my own work environment as it looked like it could solve some of my security concerns.

Blocking Copying Functions for Google Apps
Upon testing the feature, I found that I was able to block copy & paste, clipboard copy, export, downloading, and printing functions for Google App files, specifically for viewers and commenters. This feature is most useful in situations where I want to receive feedback on a Google Document but I do not want the shared users to copy or save the data to their own machines. [Link: http://googleappsupdates.blogspot.com/2015/07/disable-downloading-printing-and.html]

Though I should mention that you cannot control each of these blocks individually, it wasn’t too big of a problem since when I want to block copying, I typically want to block printing and exporting as well.

IRM in Google Drive
The IRM feature also expands to non-Google Apps files stored in Google Drive and disables the menu items for export, copying, and printing. But I noticed that the features aren’t as in-depth for Google Drive files in comparison to Google App-files since content can still be copied using the copying keyboard shortcuts.

I have some concerns with the fact that files can be opened and then screen captured for Google Apps and Non-Apps files alike. The protection for Google Drive files only applies when the files are viewed within the browser as well.

Feature Does Not Cover Editors
The IRM only applies to users that have a viewer or commenter access. So the feature cannot prevent editors from copying information. I had hoped that the IRM function would have covered all user types because there are instances where I do not want editors to be able to copy the information to their own systems but I still want the collaborative functionalities that make Google Apps so great. If Google expands the protection to editors as well, it could help to greatly improve the usability of the IRM feature. [Next post: 4 Reasons Why Google IRM is not Enough for Corporate File Sharing]

Overall, it is nice to see Google being proactive in regards to security by providing more options for users to protect their shared data. Though it’s a positive step in the right direction, the IRM feature does have room for improvement.

Categories
Blog File Server Security Insider threats 미분류

5 Security Concerns When Using Google at Work

Though Google has provided me many conveniences in the workplace, there are 5 main security concerns I have when using Google services such as Gmail, Drive, and Apps within the workplace. 

Auditing and Reporting Functions Only Available in Unlimited Storage Plan
The lack of Auditing and Reporting for the basic Google for Work plan is unfortunate. We are a small team and the basic plan is perfect for us except that it does not have auditing and reporting features to help us track data usage in Google Drive.

Discomfort when Sharing with Outside Users

We have all probably felt this at one point or another. I had to share some documents with a contact point who I did not know very well. I meet people at conferences constantly but, though they seem like stand-up people, for the most part, some piece of me is always a little anxious when sharing files from out of my inner work circle.

Discomfort when Sharing with Colleagues
Yes, I feel some discomfort when sharing with my own team as well. Call me a worrywart but I know I cannot fully control how my team uses my files. It is not because I don’t trust them. Trusting them might actually be the problem because everyone makes mistakes such as sending files to the wrong person. [Next Post: Top 3 Things to Know about Google’s Information Rights Management (IRM)].

One Account to Rule them All
Though Google’s integration capabilities provide me with endless convenience, at the same time it irks me to know that one account grants access to everything. I try to be conscious of it and not leave my laptop on or my Gmail logged in if I step away from my laptop but I’d be lying if I said that I had never forgotten to do so.

Lack of Control
I’ve read a few articles in regards to phishing attacks, one of which mentioned one that looked like a file shared through Google Drive with a fake login page. It looked quite convincing. The intrinsic problem when using a cloud storage service provider is that if any login information is phished or stolen, they could access our stored files from virtually any location.

Making Work Convenient
Despite these concerns, Google services can be utilized in the workspace as long as all of the benefits and risks are taken into consideration.

We use Google Drive to store marketing project files and data that wouldn’t be considered high-risk. In addition, Google Apps are used regularly for collaborative efforts because my entire team can work on one document simultaneously. Not to mention that Google’s overall integration provides a lot of conveniences since everything ranging from Gmail to personal preferences to calendar events is all linked to your Google account.
Overall, it is a good resource that can be utilized in the workplace but some areas need to be assessed before determining how and how much of Google’s services can be used.