{"id":74135,"date":"2023-12-10T16:05:23","date_gmt":"2023-12-10T08:05:23","guid":{"rendered":"https:\/\/version-2.com\/?p=74135"},"modified":"2023-12-14T17:21:22","modified_gmt":"2023-12-14T09:21:22","slug":"is-gmail-becoming-a-security-threat","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/12\/is-gmail-becoming-a-security-threat\/","title":{"rendered":"Is Gmail Becoming a Security Threat?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"74135\" class=\"elementor elementor-74135\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png\" width=\"1200\" height=\"628\" \/><\/p><div class=\"fl-module-content fl-node-content\"><h2>First Cisco, Now Okta<\/h2><p>In May 2022, Cisco was hit with a data breach that resulted in almost 3GB of data being stolen. You can read about what happened in more detail here, but the critical point is how the breach started \u2013 with an employee\u2019s compromised Gmail account.<\/p><p>If you use Google Chrome and you sign into Gmail, it helpfully asks you if you would like to sign in to your Google account and sync across devices. This is of course extremely convenient, as most of us have multiple devices we use on a daily basis. This way, you have all of your stuff wherever you go \u2013 work laptop, home laptop, phone, tablet. Chrome will also offer to save passwords, so you don\u2019t have to keep typing them in constantly. In some ways, this helps security \u2013 if you don\u2019t have to worry about remembering a password, you\u2019re less likely to choose a simple one or re-use a familiar one. Unfortunately, this means that those passwords are there, on any device you use, and if you slip up once, that opens you up not just to personal compromise but professional as well.<\/p><p><img decoding=\"async\" class=\"wp-image-13494 aligncenter entered lazyloaded\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png\" sizes=\"(max-width: 450px) 100vw, 450px\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png 802w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-500x263.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-768x404.png 768w\" alt=\"\" width=\"450\" height=\"237\" data-lazy-srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png 802w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-500x263.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-768x404.png 768w\" data-lazy-sizes=\"(max-width: 450px) 100vw, 450px\" data-lazy-src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png\" data-ll-status=\"loaded\" \/><noscript><img decoding=\"async\" class=\"wp-image-13494 aligncenter\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png\" alt=\"\" width=\"450\" height=\"237\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn.png 802w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-500x263.png 500w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmailSignIn-768x404.png 768w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/noscript><\/p><p>The same thing happened to Okta in 2023; the attackers targeted Okta\u2019s customers by gaining access to their support logs, which included HAR files that had session tokens, and thus opened them up to session hijacking. The source of the hack was, again, an employee\u2019s compromised Gmail account.<\/p><p>To be clear, this isn\u2019t entirely Google\u2019s fault \u2013 they take measures to protect Gmail accounts from compromise, arguably more than most other e-mail providers do. Users get prompted to review security settings regularly, they have a very robust spam filter, and they offer 2-factor authentication, which is a much better option than just using a password alone.<\/p><p><img decoding=\"async\" class=\"wp-image-13495 aligncenter\" src=\"data:;base64,<svg xmlns='http:\/\/www.w3.org\/2000\/svg' viewBox='0 0 349 261'><\/svg>&#8221; alt=&#8221;&#8221; width=&#8221;349&#8243; height=&#8221;261&#8243; data-lazy-srcset=&#8221;https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security.png 570w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security-500&#215;374.png 500w&#8221; data-lazy-sizes=&#8221;(max-width: 349px) 100vw, 349px&#8221; data-lazy-src=&#8221;https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security.png&#8221; \/><noscript><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-13495 aligncenter\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security.png\" alt=\"\" width=\"349\" height=\"261\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security.png 570w, https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail1security-500x374.png 500w\" sizes=\"(max-width: 349px) 100vw, 349px\" \/><\/noscript><\/p><p>But humans are still the weakest link in the security chain, and the numbers don\u2019t lie \u2013 <a href=\"https:\/\/www.forbes.com\/sites\/forbesbusinesscouncil\/2023\/03\/30\/lessons-learned-from-the-data-breaches-of-2022\/?sh=2803d3e642e4\" target=\"_blank\" rel=\"noopener\">over 80% of all data breaches<\/a> involve the human element. And if you think that will get better, well, according to Forrester, in the future, that number will only increase to 90%. Not even Google can compete with the persistence of threats like phishing, credential stuffing, brute forcing, and the generally terrible password hygiene habits we all practice.<\/p><h2>To Lock Down, or Not to Lock Down<\/h2><p>When the internet first became widespread, many people only had access to it at work. Having a personal computer or laptop was not quite as common, and it was years before smartphones were introduced. This led to it being treated somewhat like the telephone \u2013 for the most part, some limited personal use should be considered acceptable. However, in light of the ever-expanding threat surfaces, it makes sense to have stricter policies regarding personal activity on work devices.<\/p><p>You could prevent users from signing in their personal Gmail\/Google accounts at work (which is <a href=\"https:\/\/support.google.com\/a\/answer\/1668854?hl=en\" target=\"_blank\" rel=\"noopener\">easy to do<\/a> for both Gmail and <a href=\"https:\/\/chromeenterprise.google\/policies\/?policy=SecondaryGoogleAccountSigninAllowed\" target=\"_blank\" rel=\"noopener\">Chrome<\/a>. You can, in fact, <a href=\"https:\/\/chromeenterprise.google\/policies\/?policy=BrowserSignin\" target=\"_blank\" rel=\"noopener\">turn off the ability to sign in via Chrome altogether<\/a> if you don\u2019t use Google as your identity provider.) This is definitely not going to win your IT Team any popularity contests, and it\u2019s a bit of a draconian measure. Most people don\u2019t consider it unreasonable to quickly check their personal e-mail at work; it could even negatively impact productivity if someone is constantly having to check their phone for an e-mail from their child\u2019s school, for example.<\/p><p>A much better strategy is to implement passwordless authentication. This way, devices authenticate using a digital certificate instead of depending on a user to enter their username and password. It removes the risk of stored passwords because there simply aren\u2019t any \u2013 which actually closes several avenues for potential breaches. <a href=\"https:\/\/www.varonis.com\/blog\/data-breach-statistics#:~:text=81%20percent%20of%20confirmed%20breaches,following%20two%20years%20(IBM).\" target=\"_blank\" rel=\"noopener\">Over 80% of all data breaches are related to credentials<\/a> \u2013 weak, reused, easily guessed, or stolen, they remain the weakest link in your cybersecurity armor.<\/p><p>A huge challenge for security is balancing user experience with best practices \u2013 make things too locked down, and users will find ways around it. It\u2019s incredibly rare to find a solution that is both more secure and better for the user, but passwordless authentication offers both! Logging into things is seamless and handled completely by the device exchanging the certificate with the identity provider \u2013 from the user\u2019s perspective, they just open their laptop and boom, connected.<\/p><p>Another thing you may not realize is that passwords are costing you both time and money \u2013 an estimated <a href=\"https:\/\/blog.hypr.com\/how-much-does-a-password-reset-cost#:~:text=The%20average%20firm%20spends%20$5.2,hours%20per%20year%20resetting%20passwords.\" target=\"_blank\" rel=\"noopener\">$5.2 million per year<\/a>, in fact, and 11 hours per employee. That adds up! And that\u2019s not factoring in all the time spent training people not to click on phishing links with fake e-mails and endless training. Some estimates say that <a href=\"https:\/\/www.stationx.net\/phishing-statistics\/#:~:text=Phishing%20is%20the%20single%20most,trillion%20phishing%20emails%20per%20year.\" target=\"_blank\" rel=\"noopener\">3.4 billion phishing e-mails<\/a> are sent every day! Given the prevalence of compromised passwords and the dire impacts a breach can have, it makes sense to get the best possible security measures available. Implementing passwordless authentication can save you time, frustration, money, and keep you safer \u2013 what\u2019s not to love?<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>First Cisco, Now Okta In May 2022, Cisco was hit with a [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1075,61],"tags":[1076,352,423],"class_list":["post-74135","post","type-post","status-publish","format-standard","hentry","category-portnox","category-year2023","category-press-release","tag-1076","tag-network","tag-portnox"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Is Gmail Becoming a Security Threat? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Gmail Becoming a Security Threat? - Version 2\" \/>\n<meta property=\"og:description\" content=\"First Cisco, Now Okta In May 2022, Cisco was hit with a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-10T08:05:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-14T09:21:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2023\\\/12\\\/is-gmail-becoming-a-security-threat\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Is Gmail Becoming a Security Threat?\",\"datePublished\":\"2023-12-10T08:05:23+00:00\",\"dateModified\":\"2023-12-14T09:21:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2023\\\/12\\\/is-gmail-becoming-a-security-threat\\\/\"},\"wordCount\":840,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/gmail-security-tile.png\",\"keywords\":[\"2023\",\"Network\",\"Portnox\"],\"articleSection\":[\"Portnox\",\"2023\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2023\\\/12\\\/is-gmail-becoming-a-security-threat\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/\",\"name\":\"Is Gmail Becoming a Security Threat? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/gmail-security-tile.png\",\"datePublished\":\"2023-12-10T08:05:23+00:00\",\"dateModified\":\"2023-12-14T09:21:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/gmail-security-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/gmail-security-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/cyber-attacks\\\/is-gmail-becoming-a-security-threat\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Is Gmail Becoming a Security Threat?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Gmail Becoming a Security Threat? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/","og_locale":"zh_HK","og_type":"article","og_title":"Is Gmail Becoming a Security Threat? - Version 2","og_description":"First Cisco, Now Okta In May 2022, Cisco was hit with a [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/","og_site_name":"Version 2","article_published_time":"2023-12-10T08:05:23+00:00","article_modified_time":"2023-12-14T09:21:22+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2023\/12\/is-gmail-becoming-a-security-threat\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Is Gmail Becoming a Security Threat?","datePublished":"2023-12-10T08:05:23+00:00","dateModified":"2023-12-14T09:21:22+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2023\/12\/is-gmail-becoming-a-security-threat\/"},"wordCount":840,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png","keywords":["2023","Network","Portnox"],"articleSection":["Portnox","2023","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2023\/12\/is-gmail-becoming-a-security-threat\/","url":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/","name":"Is Gmail Becoming a Security Threat? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png","datePublished":"2023-12-10T08:05:23+00:00","dateModified":"2023-12-14T09:21:22+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2023\/12\/gmail-security-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/cyber-attacks\/is-gmail-becoming-a-security-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Is Gmail Becoming a Security Threat?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-jhJ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=74135"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74135\/revisions"}],"predecessor-version":[{"id":74293,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/74135\/revisions\/74293"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=74135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=74135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=74135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}