Go back

Security in Gmail: Verified Accounts have Arrived

Gmail Verified

Google has announced the arrival of verified accounts to its Gmail email service. The new functionality will allow the validation of brands and companies so that there is more security when communicating via email.
Gmail will display a “brand logo” next to the avatar that appears in the sender of each email, at the top left of all emails on this platform.

Gmail in Apps

In the case of mobile applications (both iOS and Android) this validation indicator can be seen directly in the inbox.
The American news network CNN was used as an example of how verified accounts will look on screen.

ALSO ON OUR BLOG…

Google-Maps-Transportation-App-Devops

Google Maps will alert congested conditions on public transportation

With this update, Google Maps adds a new collaboration to accompany all citizens in a return to the new normal after the passage of the pandemic.

Read on →

BIMI system

The validation of the accounts will be developed thanks to a system called BIMI (Brand Indicators for Message Identification). It will have an independent image identification system in which other providers also participate.
Among the companies that use this system are: LinkedIn, Fastmail and Verizon.
The main role of BIMI is to prevent malicious emails from misleading users and it will be a major advance in ending the era of phishing and the large number of scams that occur on the Internet.
The incorporation of BIMI is expected to be ready “in the coming months”, and it is believed that we will see the verified accounts in our emails sometime near the end of the year.
Google have announced that they will begin to perform pilot tests in the coming weeks with a limited number of senders.

Changes to Gmeet

The Meet video conferencing application will also undergo a series of transformations in order to better protect your security. The aim will be to ensure that only the intended participants can take part in meetings.
Controls will include the ability to determine who can request to join the meeting and in the event that the user is rejected they will not be able to make another request to join or may even be blocked.
In addition, it will be possible to establish the way in which other users are invited to join meetings through “security locks”, blocking access to anonymous users.
Any suspicious links will be scanned in real time to detect possible malicious files.
Meanwhile, it is expected that such conversations will soon be blocked and reported.
All of these new implementations are complemented by additional controls for administrators in G Suite, the application management and control console.