{"id":3515,"date":"2020-10-30T11:59:23","date_gmt":"2020-10-30T14:59:23","guid":{"rendered":"https:\/\/www.bybrand.io\/blog\/?p=3515"},"modified":"2021-08-13T12:23:08","modified_gmt":"2021-08-13T15:23:08","slug":"security-google-workspace-and-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/","title":{"rendered":"Security and Privacy Review: Google Workspace and Microsoft 365"},"content":{"rendered":"\n<p>Although the article\u2019s title references a security comparison between Google Workspace and the Microsoft 365 cloud solution, we don\u2019t want to analyze them side by side or which is better or worse in security and data processing. Both Google Workspace and Microsoft 365 are secure because they are both enterprise-grade products.<\/p>\n\n\n\n<p>We\u2019ll look at a list of what actions and features Google and Microsoft have been taking to keep their customers\u2019 data secure and, at the same time, their customers\u2019 employees safe.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-areas\"><span id=\"areas\">Areas<\/span><\/h2>\n\n\n\n<p>Cloud office applications are widely used, so we will address three main areas, which are:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-email-security\"><span id=\"email-security\">Email security<\/span><\/h3>\n\n\n\n<p><strong>Why?<\/strong> Email uses an open format and widely used in many businesses. Because of this, it is also often used to spread malware, spam, and phishing attacks. Intruders use this common gateway to get valuable company data.<\/p>\n\n\n\n<p>As business email management services, Google has Gmail and Microsoft 365, Outlook. Let\u2019s see what actions these two big companies are taking to protect their customers\u2019 email accounts.<\/p>\n\n\n\n<div class=\"wp-block-cover aligncenter has-background-dim-20 has-background-dim is-position-center-center\" style=\"background-color:#f2f2f9;min-height:190px;aspect-ratio:unset;\"><img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"200\" class=\"wp-block-cover__image-background wp-image-5113\" alt=\"\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/integrations-header-bg.png\" data-object-fit=\"cover\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/integrations-header-bg.png 560w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/integrations-header-bg-300x107.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/integrations-header-bg-150x54.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/integrations-header-bg-420x150.png 420w\" sizes=\"auto, (max-width: 560px) 100vw, 560px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-left has-text-color\" style=\"color:#191970;font-size:26px;line-height:1.1\">? <strong><span style=\"color:#191970\" class=\"has-inline-color\"><a href=\"https:\/\/www.bybrand.io\/integrations\/workspace?utm_source=blog&utm_medium=post&utm_campaign=spotlight-block\" target=\"_blank\" rel=\"noreferrer noopener\">Meet Bybrand: Built with love for companies that use Google Workspace<\/a><\/span><\/strong><\/p>\n<\/div><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-user-login-security\"><span id=\"user-login-security\">User login security<\/span><\/h3>\n\n\n\n<p><strong>Why?<\/strong> Companies don\u2019t hire Google Workspace or Microsoft 365 to send and receive email messages only. In some cases, employees don\u2019t need access to professional email accounts. But they often use other standalone applications, such as Google Sheets and Microsoft Excel.<\/p>\n\n\n\n<p>These users need to log in to the platform. Let\u2019s look at what security practices Google and Microsoft have been taking to protect users\u2019 logins.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-sensitive-information-and-data-security\"><span id=\"sensitive-information-and-data-security\">Sensitive information and data security<\/span><\/h3>\n\n\n\n<p><strong>Why?<\/strong> A company needs to protect its intellectual capital and customer information. What means to protect sensitive data, Google and Microsoft have been taking, what information do they collect for their analysis? This survey is not about the physical security of Google or Microsoft data centers.<\/p>\n\n\n\n<p>But, before we start, let\u2019s get to know a little about them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-google-workspace-and-microsoft-365-briefly\"><span id=\"google-workspace-and-microsoft-365-briefly\">Google Workspace and Microsoft 365, briefly<\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-1024x536.jpg\" alt=\"Google Workspace e Microsoft 365 pequena descri\u00e7\u00e3o\" class=\"wp-image-3474\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-1024x536.jpg 1024w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-300x157.jpg 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-150x79.jpg 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-768x402.jpg 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-764x400.jpg 764w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft-420x220.jpg 420w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-microsoft.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Microsoft 365 (formerly known as Office 365) has Outlook, Word, Excel, PowerPoint, OneNote, and OneDrive as options for online office apps.<\/p>\n\n\n\n<p>Google Workspace (formerly G Suite) has Gmail, Calendar, Meet, Chat, Drive, Docs, Sheets, Slides as a suite option for office productivity apps.<\/p>\n\n\n\n<p>Sounds like a good description, right? Now, let\u2019s get down to business.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-in-google-workspace\"><span id=\"security-in-google-workspace\">Security in Google Workspace<\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-1024x536.jpg\" alt=\"Security on Google Workspace\" class=\"wp-image-3476\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-1024x536.jpg 1024w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-300x157.jpg 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-150x79.jpg 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-768x402.jpg 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-764x400.jpg 764w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security-420x220.jpg 420w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workspace-security.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>As an administrator, Google Workspace allows you to set custom rules to protect incoming emails against phishing and harmful software (malware), including protection against unusual attachment types.<\/p>\n\n\n\n<p>You can enable spoofing protection for private or all groups. This kind of attack is when the hacker tries to impersonate someone he isn\u2019t, such as a domain or employee.<\/p>\n\n\n\n<p>The interesting part about Google Workspace is that the setup steps are simple, and it is up to the administrator.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\"><em>Admin Console > Menu> Applications> G Suite> Gmail> Security<\/em>\n<\/pre>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"437\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-quarantine-emais.gif\" alt=\"Admin console on Google\" class=\"wp-image-3478\"\/><\/figure><\/div>\n\n\n\n<p>To protect email messages, Gmail uses industry-standard techniques. Enabling IT administrators to define custom rules that require email messages to be signed and encrypted using Secure\/Multipurpose Internet Mail Extensions (S\/MIME).<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>S\/MIME encryption available on the Enterprise plan;<\/li><\/ul>\n\n\n\n<p>There is the <a href=\"https:\/\/landing.google.com\/advancedprotection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Advanced Protection Program<\/a> that provides stronger protection for users at risk of targeted attacks. The Advanced Protection Program applies a specific set of policies for enrolled users, including security key enforcement, blocking access to untrusted applications, and enhanced scanning for email threats.<\/p>\n\n\n\n<h3 id=\"user-login-security-in-google-workspace\" class=\"wp-block-heading\">User login security in Google Workspace<\/h3>\n\n\n\n<p>Now addressing user authentication security, let\u2019s take a look at Google\u2019s main methods.<\/p>\n\n\n\n<p>Starting with the fundamental issues, it is offered a 2-factor authentication option (two factors and applies it to all of your users) and the detection of suspicious logins. Whenever a suspicious login is detected, the administrator is notified so that they can take measures to ensure the security of the user\u2019s account.<\/p>\n\n\n\n<p>Unified access through Single Sign-On (SSO) allows access to other enterprise applications in the cloud, such as logging in directly to <a href=\"https:\/\/www.bybrand.io\" target=\"_blank\" rel=\"noreferrer noopener\">Bybrand<\/a>. The Google Identity and Access Management (IAM) service also allows administrators to help manage all user credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"873\" height=\"493\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google.png\" alt=\"Bybrand Login\" class=\"wp-image-3480\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google.png 873w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google-300x169.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google-150x85.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google-768x434.png 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google-708x400.png 708w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/bybrand-login-with-google-407x230.png 407w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li>SAML-based single sign-on service (SSO);<\/li><li>OAuth2-based single sign-on service (SSO);<\/li><li>SSO with a third-party identity provider (IdP) (Okta, OneLogin, 1password);<\/li><\/ul>\n\n\n\n<p>However, protocols alone are not enough. Google Workspace provides administrators with the option of asking their users to register a strong password and that this password meets certain characters (for example, number of characters, password strength .).<\/p>\n\n\n\n<p>And it goes beyond that, you can apply the settings to the mobile devices of your employees for professional purposes.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-576x1024.png\" alt=\"Managed employees devices\" class=\"wp-image-3482\" width=\"288\" height=\"512\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-576x1024.png 576w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-169x300.png 169w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-84x150.png 84w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-225x400.png 225w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge-129x230.png 129w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-workchallenge.png 600w\" sizes=\"auto, (max-width: 288px) 100vw, 288px\" \/><\/figure><\/div>\n\n\n\n<p>The administrator can protect your organization\u2019s data by requiring the managed devices to have a screen lock or password.<\/p>\n\n\n\n<p>You can customize <a href=\"https:\/\/gsuiteupdates.googleblog.com\/2020\/09\/context-aware-access-saml-apps-generally-available.html\" target=\"_blank\" rel=\"noreferrer noopener\">access control based on specific attributes<\/a> using granular access control for SAML applications, including user, geolocation, device security status, and IP address, thereby reducing the chances of unintended access to specific applications or the information inside them.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"620\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control.png\" alt=\"Apps list on Google admin console\" class=\"wp-image-3506\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control.png 1018w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control-300x183.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control-150x91.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control-768x468.png 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control-657x400.png 657w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/google-apps-control-378x230.png 378w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/figure>\n\n\n\n<h3 id=\"data-security-in-google-workspace\" class=\"wp-block-heading\">Data security in Google Workspace<\/h3>\n\n\n\n<p>Now, let\u2019s take a look at Google Workspace security controls that can help you manage data protection to meet the needs of your organization.<\/p>\n\n\n\n<p>In the past, Google has suffered several criticisms related to its user data (advertising data machine); its collection is used for targeted ads. But this does not apply to corporate accounts; as of last year, Google has been <a href=\"https:\/\/cloud.google.com\/blog\/products\/workspace\/announcing-new-security-and-privacy-updates-in-google-workspace\" target=\"_blank\" rel=\"noreferrer noopener\">improving its policies for handling user data<\/a> in the corporate environment.<\/p>\n\n\n\n<p>For IT administrators, one of their top priorities is keeping internal information secure and protected. With the <a rel=\"noreferrer noopener\" href=\"https:\/\/support.google.com\/a\/topic\/7556687?hl=en&ref_topic=7556782\" target=\"_blank\">Data Loss Prevention Policies<\/a> (DLP), you can choose which types of data are sensitive and how to protect them.<\/p>\n\n\n\n<p>The program allows easy detection of various common information types (such as credit card numbers in emails). You can configure policy-based actions and prevent users from sharing Google emails or Drive files if sensitive content is detected.<\/p>\n\n\n\n<p>A powerful tool that helps administrators prevent abuse and malicious behavior is <strong>Google Vault<\/strong>. You can create retention rules and save documents such as email messages and Drive files. With Vault, you can control access and what actions are available in the app.<\/p>\n\n\n\n<p>This ensures that only authorized users have access to your organization\u2019s data.<\/p>\n\n\n\n<p>Within the area of certifications, the <a href=\"https:\/\/cloud.google.com\/security\/compliance\/iso-27701\" target=\"_blank\" rel=\"noreferrer noopener\">Google Cloud Platform is ISO\/IEC 27701 certified<\/a>. A global standard designed to help organizations to get in accordance with international privacy frameworks and laws. It provides guidance for continuously implementing, maintaining, and improving security in data processors \u2013 important for organizations that following the GDPR.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/cloud.google.com\/security\/compliance\">List of certifications received<\/a>;<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-security-in-microsoft-365\"><span id=\"security-in-microsoft-365\">Security in Microsoft 365<\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-1024x536.jpg\" alt=\"Security on Microsoft 365\" class=\"wp-image-3486\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-1024x536.jpg 1024w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-300x157.jpg 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-150x79.jpg 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-768x402.jpg 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-764x400.jpg 764w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security-420x220.jpg 420w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/microsoft-365-security.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Microsoft 365 saw <a href=\"https:\/\/venturebeat.com\/2020\/10\/27\/microsoft-teams-passes-115-million-daily-active-users\/\" target=\"_blank\" rel=\"noreferrer noopener\">significant growth in its services, especially Microsoft Teams<\/a>, during the year 2020. Communication tools such as Microsoft Teams and the web version of Outlook are essential to keeping businesses running. But these tools are not immune to safety and regulatory compliance risks.<\/p>\n\n\n\n<p>For security in emails, Outlook has advanced protection for attachments or links in incoming messages, the service uses techniques to detect viruses and malware. And, if something is found, it will be removed so that you do not accidentally open it. For suspicious links in messages, if you click one, you are redirected to a warning page.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/102867cd-0af9-42bc-81cf-738dccff13bc.png\" alt=\"Outlook safe \" class=\"wp-image-3488\" width=\"450\" height=\"326\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/102867cd-0af9-42bc-81cf-738dccff13bc.png 520w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/102867cd-0af9-42bc-81cf-738dccff13bc-300x217.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/102867cd-0af9-42bc-81cf-738dccff13bc-150x108.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/102867cd-0af9-42bc-81cf-738dccff13bc-318x230.png 318w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/figure><\/div>\n\n\n\n<p>As email usage grew, the number of abusers also followed the same path. <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/security\/microsoft-365-defender\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender<\/a> (formerly known as Microsoft Threat Protection) uses artificial intelligence to reduce spam and fraudulent emails (phishing) on the platform. You can also use the built-in reporting options directly in the Outlook mailbox to send false positives (good emails marked as spam), false negatives (incorrect emails), and phishing messages.<\/p>\n\n\n\n<figure class=\"wp-block-gallery aligncenter columns-2 wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"182\" height=\"141\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-junk.png\" alt=\"\" data-id=\"3492\" data-full-url=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-junk.png\" data-link=\"https:\/\/www.bybrand.io\/blog\/pt-br\/?attachment_id=3492\" class=\"wp-image-3492\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-junk.png 182w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-junk-150x116.png 150w\" sizes=\"auto, (max-width: 182px) 100vw, 182px\" \/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"214\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-as-junk-dialog.png\" alt=\"\" data-id=\"3490\" data-full-url=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-as-junk-dialog.png\" data-link=\"https:\/\/www.bybrand.io\/blog\/pt-br\/?attachment_id=3490\" class=\"wp-image-3490\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-as-junk-dialog.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/owa-report-as-junk-dialog-150x107.png 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>Mailboxes can become repositories for large amounts of potentially sensitive information such as financial data, legal contracts, or patient health information.<\/p>\n\n\n\n<p>With the encryption of email messages, Microsoft 365 uses Office Message Encryption (OME), where your organization can send and receive encrypted email messages between people inside or outside your organization, regardless of the destination email address.<\/p>\n\n\n\n<p>The service offers two more <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/email-encryption?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">encryption options to help you meet email security needs<\/a>.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Secure\/Multifunction Internet Mail Extensions (S\/MIME);<\/li><li>Information Rights Management (IRM).<\/li><\/ul>\n\n\n\n<h3 id=\"user-login-security-in-microsoft-365\" class=\"wp-block-heading\">User login security in Microsoft 365<\/h3>\n\n\n\n<p>Now let\u2019s take a look at the key methods that Microsoft 365 uses for user authentication security.<\/p>\n\n\n\n<p>Microsoft 365 uses the <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\">Azure Active Directory <\/a>(Azure AD) solutions for identity management. Users can log on to applications (SSO) and, this way, it adds security and convenience. Single sign-on provides a breakthrough in how users sign in and use Microsoft 365 apps and software as a service (SaaS) partners.<\/p>\n\n\n\n<p>It is not clear, but this option seems to be <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/enterprise\/microsoft-365-client-support-single-sign-on?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">available only for Microsoft 365 Enterprise<\/a>.<\/p>\n\n\n\n<p>The advantage of Single Sign-On is that you can use the same account to enter the restricted area of other web applications. With just one authentication login, your job of running tasks on other software outside of the Microsoft ecosystem becomes more efficient and secure.<\/p>\n\n\n\n<p>Some popular examples of web applications include:<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike.png\" alt=\"Register on Wrike\" class=\"wp-image-3496\" width=\"531\" height=\"445\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike.png 640w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike-300x251.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike-150x126.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike-478x400.png 478w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/login-wrike-275x230.png 275w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/wrike.com\/\" target=\"_blank\">Wrike<\/a> (project management);<\/li><li>Salesforce;<\/li><li>SurveyMonkey;<\/li><\/ul>\n\n\n\n<p>Microsoft 365 implements a multi-factor authentication (MFA). With two-step verification, administrators can reduce the risk of unauthorized access by asking users for additional proof of identity when signing in.<\/p>\n\n\n\n<p>An example: you first specify your password, and when prompted, you also enter a dynamically generated verification code. Setup can be done in two ways: one is the standard method, using the free Microsoft Authenticator app on your mobile device.<\/p>\n\n\n\n<p>The other way is to use SMS messages sent to your phone.<\/p>\n\n\n\n<p><strong>Backup methods:<\/strong> In situations where you do not have the phone or device you have set up as your preferred verification method with you, you can set up backup methods for your account. Generating unique codes that you keep in a safe place.<\/p>\n\n\n\n<h3 id=\"data-security-in-microsoft-365\" class=\"wp-block-heading\">Data security in Microsoft 365<\/h3>\n\n\n\n<p>For sensitive or important data (social security numbers or health records), Microsoft 365 has the Sensitivity Labels solution, which allows you to classify and protect your organization\u2019s data while ensuring that user productivity and ability to collaborate are not impaired.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"359\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/sensitivity-label-in-excel.jpg\" alt=\"Microsoft Sensitive data protection\" class=\"wp-image-3498\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/sensitivity-label-in-excel.jpg 700w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/sensitivity-label-in-excel-300x154.jpg 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/sensitivity-label-in-excel-150x77.jpg 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/sensitivity-label-in-excel-420x214.jpg 420w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p>The tool is useful when content no longer falls behind a firewall or is exchanged between applications and services outside the control of the organization. Very common for documents and emails.<\/p>\n\n\n\n<p>Administrators and their organizations must protect sensitive information in multiple locations, comply with industry regulatory standards, and avoid unintentional disclosure. With the <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/data-loss-prevention-policies?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Data Loss Prevention Policy<\/a> (DLP) solution in the Office 365 Security & Compliance Center, you can automatically identify, monitor, and protect your users\u2019 sensitive information.<\/p>\n\n\n\n<p>You can use DLP to help detect the presence of information subject to the Health Insurance Portability and Accountability Act (HIPAA) in OneDrive for Business files by finding any document that contains sensitive information that is shared with people outside your company, and thus blocking access to that file (requiring extra actions).<\/p>\n\n\n\n<p>Within the certifications, Microsoft has been working on building the most secure online collaboration solutions for its enterprise customers. Receiving an ISO\/IEC 27001 certification shows its commitment to keeping promises from a business and security compliance point of view.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>In detail, all <a rel=\"noreferrer noopener\" href=\"https:\/\/www.microsoft.com\/en-us\/trust-center\/compliance\/compliance-overview\" target=\"_blank\">certifications obtained by Microsoft<\/a>;<\/li><\/ul>\n\n\n\n<p id=\"h-related\"><strong>Related<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.bybrand.io\/blog\/gsuite-vs-office365-vs-zoho\/\">Comparative: Google Workspace, Microsoft 365 or Zoho Workplace<\/a>;<\/li><li><a href=\"https:\/\/www.bybrand.io\/blog\/market-share\/\" target=\"_blank\" rel=\"noreferrer noopener\">Market share: Google Workspace, Microsoft 365, and Zoho<\/a>;<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<h2 id=\"employee-education\" class=\"wp-block-heading\">Employee education<\/h2>\n\n\n\n<p>Additional security and certifications are a great benefit. But it would help if you did not leave the responsibility of protection only at the hands of third parties or programs.<\/p>\n\n\n\n<p>CEO, CTOs, and IT administrators who are often at the forefront of data protection should also create strict policies for their employees.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ask employees to use strong passwords and demand frequent password changes. This helps ensure that even if a password is compromised, its use can be limited.<\/li><li>Make sure that webmail applications use encryption. This is a standard but critical functionality to prevent emails from being intercepted by malicious agents.<\/li><li>Use a password manager for the team (LastPass, Dashlane);<\/li><li>Restrict access to services via public Wi-Fi networks.<\/li><\/ul>\n\n\n\n<p>In addition to implementing policies and procedures that promote security, companies can encourage their employees to follow best practices to ensure enterprise-wide security.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill-element has-text-color\" style=\"color:#333333;grid-template-columns:18% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-1024x536.png\" alt=\"Bybrand background\" class=\"wp-image-3392 size-full\" style=\"object-position:0% 50%\" srcset=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-1024x536.png 1024w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-300x157.png 300w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-150x79.png 150w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-768x402.png 768w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-764x400.png 764w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2-420x220.png 420w, https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/signature-block-footer2.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading\" id=\"h-create-your-first-email-signature-with-bybrand\"><span id=\"create-your-first-email-signature-with-bybrand\">Create your first email signature with Bybrand<\/span><\/h3>\n\n\n\n<p>Bybrand offers the ability to generate, administer, and distribute essential email signatures for your employees.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/app.bybrand.io\/auth\/create?utm_source=blog&utm_medium=post&utm_campaign=free_trial_en\" style=\"background-color:#191970\" target=\"_blank\" rel=\"noreferrer noopener\">Start a free-trial<\/a><\/div>\n<\/div>\n\n\n\n<p>Or <a href=\"https:\/\/www.bybrand.io\/?utm_source=blog&utm_medium=post&utm_campaign=moreinfo_en\">get more information<\/a>.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"The Google Workspace and Microsoft 365 office applications are widely used. What these two companies are doing to improve customer safety\n","protected":false},"author":2,"featured_media":3521,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1947],"tags":[],"class_list":{"0":"post-3515","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-reviews"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security and privacy review: Google Workspace and Microsoft 365<\/title>\n<meta name=\"description\" content=\"Are Google Workspace and Microsoft 365 secure? What methods and security actions did the two companies take to keep their customers&#039; data, email, and information safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Privacy Review: Google Workspace and Microsoft 365\" \/>\n<meta property=\"og:description\" content=\"The Google Workspace and Microsoft 365 office applications are widely used. What these two companies are doing to improve customer safety\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/\" \/>\n<meta property=\"og:site_name\" content=\"Bybrand\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bybrandio\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T14:59:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-13T15:23:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bernardo Castro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/bernardocastro\" \/>\n<meta name=\"twitter:site\" content=\"@bybrandio\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/\"},\"author\":{\"name\":\"Bernardo Castro\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#\\\/schema\\\/person\\\/50e50df741b20f36b225fe0b64e11a2b\"},\"headline\":\"Security and Privacy Review: Google Workspace and Microsoft 365\",\"datePublished\":\"2020-10-30T14:59:23+00:00\",\"dateModified\":\"2021-08-13T15:23:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/\"},\"wordCount\":1962,\"publisher\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/security-google-microsoft-EN.jpg\",\"articleSection\":[\"Reviews\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/\",\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/\",\"name\":\"Security and privacy review: Google Workspace and Microsoft 365\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/security-google-microsoft-EN.jpg\",\"datePublished\":\"2020-10-30T14:59:23+00:00\",\"dateModified\":\"2021-08-13T15:23:08+00:00\",\"description\":\"Are Google Workspace and Microsoft 365 secure? What methods and security actions did the two companies take to keep their customers' data, email, and information safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/security-google-microsoft-EN.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/security-google-microsoft-EN.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/security-google-workspace-and-microsoft-365\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Privacy Review: Google Workspace and Microsoft 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/\",\"name\":\"Bybrand\",\"description\":\"Business Email Signatures Manager\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#organization\",\"name\":\"Bybrand\",\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/icon-600x600-1.png\",\"contentUrl\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/icon-600x600-1.png\",\"width\":600,\"height\":600,\"caption\":\"Bybrand\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bybrandio\\\/\",\"https:\\\/\\\/x.com\\\/bybrandio\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCPUuCgnrU3CWGJiQz5ZoZdA\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/bybrand\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/#\\\/schema\\\/person\\\/50e50df741b20f36b225fe0b64e11a2b\",\"name\":\"Bernardo Castro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g\",\"caption\":\"Bernardo Castro\"},\"description\":\"I'm a back-end Developer founder of Bybrand, And I've been working on this project since 2017. I love to work with email solutions. In my free time, you can find me on a mountain.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/bernardodecastro\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/bernardocastro\"],\"url\":\"https:\\\/\\\/www.bybrand.io\\\/blog\\\/author\\\/bernardo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security and privacy review: Google Workspace and Microsoft 365","description":"Are Google Workspace and Microsoft 365 secure? What methods and security actions did the two companies take to keep their customers' data, email, and information safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/","og_locale":"en_US","og_type":"article","og_title":"Security and Privacy Review: Google Workspace and Microsoft 365","og_description":"The Google Workspace and Microsoft 365 office applications are widely used. What these two companies are doing to improve customer safety","og_url":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/","og_site_name":"Bybrand","article_publisher":"https:\/\/www.facebook.com\/bybrandio\/","article_published_time":"2020-10-30T14:59:23+00:00","article_modified_time":"2021-08-13T15:23:08+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg","type":"image\/jpeg"}],"author":"Bernardo Castro","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/bernardocastro","twitter_site":"@bybrandio","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#article","isPartOf":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/"},"author":{"name":"Bernardo Castro","@id":"https:\/\/www.bybrand.io\/blog\/#\/schema\/person\/50e50df741b20f36b225fe0b64e11a2b"},"headline":"Security and Privacy Review: Google Workspace and Microsoft 365","datePublished":"2020-10-30T14:59:23+00:00","dateModified":"2021-08-13T15:23:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/"},"wordCount":1962,"publisher":{"@id":"https:\/\/www.bybrand.io\/blog\/#organization"},"image":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg","articleSection":["Reviews"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/","url":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/","name":"Security and privacy review: Google Workspace and Microsoft 365","isPartOf":{"@id":"https:\/\/www.bybrand.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#primaryimage"},"image":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg","datePublished":"2020-10-30T14:59:23+00:00","dateModified":"2021-08-13T15:23:08+00:00","description":"Are Google Workspace and Microsoft 365 secure? What methods and security actions did the two companies take to keep their customers' data, email, and information safe.","breadcrumb":{"@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#primaryimage","url":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg","contentUrl":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2020\/10\/security-google-microsoft-EN.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.bybrand.io\/blog\/security-google-workspace-and-microsoft-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.bybrand.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Security and Privacy Review: Google Workspace and Microsoft 365"}]},{"@type":"WebSite","@id":"https:\/\/www.bybrand.io\/blog\/#website","url":"https:\/\/www.bybrand.io\/blog\/","name":"Bybrand","description":"Business Email Signatures Manager","publisher":{"@id":"https:\/\/www.bybrand.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bybrand.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bybrand.io\/blog\/#organization","name":"Bybrand","url":"https:\/\/www.bybrand.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bybrand.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/icon-600x600-1.png","contentUrl":"https:\/\/www.bybrand.io\/blog\/wp-content\/uploads\/2021\/04\/icon-600x600-1.png","width":600,"height":600,"caption":"Bybrand"},"image":{"@id":"https:\/\/www.bybrand.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bybrandio\/","https:\/\/x.com\/bybrandio","https:\/\/www.youtube.com\/channel\/UCPUuCgnrU3CWGJiQz5ZoZdA","https:\/\/www.linkedin.com\/company\/bybrand"]},{"@type":"Person","@id":"https:\/\/www.bybrand.io\/blog\/#\/schema\/person\/50e50df741b20f36b225fe0b64e11a2b","name":"Bernardo Castro","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7ddf3fe0350f80a074fb3a880c72d7c2194588e5a3afc9e5394a3aa56839505?s=96&d=mm&r=g","caption":"Bernardo Castro"},"description":"I'm a back-end Developer founder of Bybrand, And I've been working on this project since 2017. I love to work with email solutions. In my free time, you can find me on a mountain.","sameAs":["https:\/\/www.linkedin.com\/in\/bernardodecastro\/","https:\/\/x.com\/https:\/\/twitter.com\/bernardocastro"],"url":"https:\/\/www.bybrand.io\/blog\/author\/bernardo\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/posts\/3515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/comments?post=3515"}],"version-history":[{"count":34,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/posts\/3515\/revisions"}],"predecessor-version":[{"id":6714,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/posts\/3515\/revisions\/6714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/media\/3521"}],"wp:attachment":[{"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/media?parent=3515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/categories?post=3515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bybrand.io\/blog\/wp-json\/wp\/v2\/tags?post=3515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}