1. Enforce 2-Step Verification (2SV)
If you do only one thing from this list, make it this. 2-Step Verification requires a second form of verification in addition to a password. This means that even if a criminal steals a user's password, they can't access the account without their phone or a physical security key.
Critical Insight: Google reports that 2SV blocks 100% of automated bot attacks. Without it, your accounts are vulnerable.
Implementation Steps
- Navigate to Security → Authentication → 2-Step Verification.
- Don't just "allow" 2SV—enforce it for all users.
- Set a grace period (e.g., 1-2 weeks) for your team to enroll.
2. Protect Your Email from Spoofing
SPF, DKIM, and DMARC are like your email's digital passport. They are settings in your domain's DNS that prove emails sent from your domain are legitimate, preventing criminals from "spoofing" your email addresses to impersonate you.
Key Insight: Correctly configuring these records is a technical but essential step to protect your brand's reputation and prevent phishing attacks.
Understanding The Records
3. Control Third-Party App Access
Each time an employee clicks "Sign in with Google" on a new service, they may grant that app ongoing access to emails, contacts, and files. Attackers specifically target poorly secured apps as an easy entry point.
Your Action Plan
- Audit current connections: Review
Apps → Connected Appsand remove unused or untrusted apps. - Implement allowlisting: Create an approved list of trusted applications and block all others by default.
- Schedule quarterly reviews to ensure continued compliance.
4. Lock Down Your File Sharing
One of Google Drive's best features—easy sharing—can also be its biggest risk. A common mistake is allowing users to share files publicly with "Anyone with the link," which can expose sensitive data to the entire internet.
Warning: An accidental public share of a sensitive client document can have devastating consequences for your business reputation and legal compliance.
Your Action Plan
- Set the default sharing setting to "Private" or "Only people in your organization."
- Train your team to be intentional about who they grant access to, preferring to share with specific people.