Google Email Security
Google's spam protection acts as a powerful, multi-layered digital defence system working non-stop at the gateway of your email inbox. It consistently observes, scans, and leverages Artificial Intelligence to block over 99% of dangerous and unwanted emails before they ever reach you.
Autonomous Filtering: The system automatically identifies and discards digital threats—including basic Junk Mail (Spam) and sophisticated scams (phishing and malware)—so you never have to waste time sorting through hundreds of malicious messages.
The Digital Shield: Google provides a robust shield against viruses, malware, and phishing attempts that aim to steal your login credentials or compromise company data.
Final Line of Warning: In the event a highly sophisticated email manages to bypass the automated filters, Google often displays a prominent, yellow security banner at the top of the message. This gives you a clear, final warning, empowering you to avoid reading or clicking a potential threat.
IT Email Security
The Swish IT Team provides a robust, multi-layered defence to keep your inbox safe and productive. We actively manage Google's security tools to protect you from unwanted and malicious emails.
Proactive Protection: IT Services maintains and fine-tunes a number of security layers—including spam filters and blocked sender lists—to dramatically reduce the chances of a dangerous or unwanted email reaching your inbox.
The Quarantine Control Room: We don't rely solely on automated filtering. IT accesses a special Quarantine Dashboard within Google. This is our "Control Room" where we review every single email that was stopped by our custom rules.
Prioritizing Threats: By reviewing the quarantined messages, we are able to quickly prioritize the biggest threats, immediately blocking confirmed phishing scams and malicious emails before they can harm anyone in the organization.
This constant oversight ensures that while automation stops the majority of attacks, the IT team is always there to catch the highly sophisticated threats and keep your working environment secure.
What is Sentinel One?
Sentinel One is comprised of two parts, Sentinel One Agent and Vigilance. Think of both of them as highly trained security guards for our computers, they stand guard and prevent any unwanted guests from getting into our computers and other devices.
Sentinel One Agent: is a piece of software installed on all of our computers, watching and securing our computers 24/7 almost like Robot Guards. This Agent uses various resources to guard our computers from unusual activity, viruses, internet attacks, unsafe email attachments and much more. If Sentinel One spots a threat it acts instantly to stop it, isolate it, and clean it up. It can stop that virus or malicious program and even reverse any changes made during the attack.
Vigilance: is the security operations centre staffed by expert analysts, these experts act as the human intelligence behind the robot guards. Every day the Sentinel One agents generate thousands of notifications and reports that all get filtered through Vigilance. Vigilance then reviews every single one of those reports, see's if it's real, a dangerous threat, or just a false alarm. Vigilance confirms the severity of a threat, investigates the cause of the threat, and ensures the Sentinel One Agents response was correct and continues to be correct in the future.
What is 1Password?
Think of 1Password as your own highly-secure, digital safety deposit box—or a "secret vault" for your entire online life.
1Password is an application that remembers all your passwords and other sensitive information so you don't have to. You only need to remember one strong password—your Master Password—to unlock your vault. This vault is protected by a powerful combination of your Master Password and a unique, long code called your Secret Key, ensuring that only you can access your data.
Master Password vs Secret Key (What are the differences between them?)
The Master Password is the one password you create and memorize in order to access the 1Password App, Website, and Extension. This password needs to be a strong password that's easy for you to remember as it is needed to access your vault of stored passwords and accounts you save at work.
The Secret Key is a 34-character string of letters and numbers generated for you by 1Password. This acts as a failsafe to ensure that only the person (you) with the Secret Key can connect to your 1Password Account. In order to add your 1Password Vault to another device like a phone, computer, or tablet you would need your email, master password, and secret key. The secret ket provides an extra layer of protection ensuring hackers are unable to access your vault of stored passwords and accounts.
How it Stores Passwords
Instead of using the same easy password everywhere (which is risky) or writing them down (which is unsafe), 1Password:
Generates Strong, Unique Passwords: It creates complex, random passwords for all your accounts, making them virtually impossible for hackers to guess.
Stores Everything Securely: It locks these passwords inside your vault using advanced encryption.
Autofill's for You: When you visit a website, 1Password automatically fills in your username and password, saving you time and protecting you from accidentally typing your information into a fake (phishing) site.
How it Safeguards Against Fraud
1Password helps protect you from two major security threats: data breaches and identity theft. Its primary tool for this is called Watchtower.
Protecting You from Breaches: The Watchtower feature constantly monitors your stored passwords against known data breaches. If a company you have an account with (like a customer portal or shopping site) suffers a hack, Watchtower will notify you immediately so you can change the affected password.
Eliminating Weak Links: Watchtower checks for weak, old, or re-used passwords in your vault and prompts you to update them. By forcing you to use unique, strong passwords for every site, it ensures that if one account is compromised, all your others remain safe.
How it's Used for Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA) is a security feature that requires two proofs of identity—like a password and a temporary code—to log in. 1Password simplifies this critical step.
The Problem: Normally, you have to use a separate app (like Google Authenticator) to get your 2FA codes.
The 1Password Solution: 1Password can act as your 2FA authenticator for most of your online accounts. It generates and stores the time-based one-time passwords right next to the login information. When you sign in to a site that requires 2FA, 1Password autofill's both the password and the one-time code simultaneously, making your account highly secure without slowing down your login process.
An example of this is our Swish and Charlotte Email accounts. When we sign into Gmail it asks us for our email address and password, then it asks us to verify with a one time code. For the users with 1Password set up as their Two-Factor Authentication, it will automatically sign into your email by filling in the Email, Password, and One Time code all at the same time. Some users may have to enter the code manually through the 1Password Extension or App while other users may have a Cell Phone they use to verify their email. This process of requiring three pieces of information—the email (your identity), the password (something you know), and the one-time code (something you have)—is what adds that powerful secondary layer of protection to our email accounts and important data.