Author Archives: Chad Tyler

A guide to Google Meet for parents and guardians

When the COVID-19 pandemic required students worldwide to transition to distance learning, many parents and guardians suddenly found themselves in the role of part-time teachers — and even IT technicians — on top of their existing responsibilities at work and home. If this describes your family’s situation these days, you’re definitely not alone. Many students and schools use Google Workspace for Education for teaching and learning – which includes tools for organizing classwork, like Google Classroom, and for video conferencing, like Google Meet. If you’re new to using Google Meet, we created the below guide to help make things easier while you juggle your many roles at home. 

What is Google Meet?

Google Meet is Google’s secure and easy-to-use video conferencing solution that is available to schools for free through Google Workspace for Education. Educators use Meet to connect with your child one-on-one, to facilitate remote instruction and to hold virtual meetings and conferences with parents and guardians.


Meet works with all modern web browsers (like Chrome, Safari, etc.), meaning you don’t have to install or download software to your desktop computer in order to use it. For those looking to join from a mobile device like a tablet or smartphone, Meet has a dedicated mobile app that optimizes the video conferencing experience for mobile conditions. If you are using Meet on a Chromebook, we recently made significant performance improvements like audio and video optimizations and the ability to handle multitasking better.

How do I join a Google Meet?

There are a variety of ways to join a call or meeting, including joining from Google Classroom, or via a meeting link or invitation that your teacher has shared via email or Calendar.

How does Meet protect my child’s safety and privacy? 

Google is committed to building products that help protect student and teacher privacy and security. 

We designed Meet with industry-leading built-in protections that help keep calls safe by default. Here are a few examples: 

  • Encryption by default:In Meet, all data is encrypted in transit by default between your device and Google.

  • Unique meeting IDs:Each Meeting ID is 10 characters long, with 25 characters in the set, so it’s difficult to make an unauthorized attempt to join the meeting by guessing the ID. 

  • Protection against reusing finished meetings:Students can’t rejoin meetings once the final participant has left, unless they have meeting creation privileges to start a new meeting. This means if the instructor is the last person to leave a meeting, students can’t join again until an instructor restarts the meeting.

  • No plug-ins required:To limit the attack surface and eliminate the need to push out frequent security patches, Meet works entirely in your web browser, eliminating the need to download and update plug-ins.

Meet also gives educators powerful controls to help keep virtual classes safe and secure. 

  • Safety locks: Educators can decide which methods of joining (via calendar invite or phone, for example) require users to obtain explicit approval to join. 

  • Block anonymous users by default:Engaging safety locks will block all attempts to join a meeting from anonymous users (users not logged in through a Google Account), and enforce the requirement that the host joins first.

  • Host moderation controls:Educators can control the level of participant interactivity in the meeting. The chat lock and present lock will let hosts control which attendees can chat and present content within the meeting. Educators can also access these controls on mobile devices. 

  • End a meeting for all participants:Prevents students from staying on after the teacher has left — including in breakout rooms.

How does Meet help keep my child engaged during class?

Over the past year, we’ve launched a number of features to help engage students by bringing some of in-classroom magic to the virtual classroom: 

  • Hand raise, to help students indicate if they have a question or want to speak without disrupting the class.

  • Breakout rooms, used by educators to host small group discussions or working time. Teachers can easily jump between the different breakout rooms before bringing everyone back to the main discussion. 

  • Q&A, allowing students to submit and upvote questions from the teacher for better group engagement.

  • Polls, used by educators to quickly gather feedback from their students, oftentimes using it to identify topics that need more discussion or to test comprehension of a certain topic. 

  • Captions, allowing participants to follow along with live closed captions in Meet. Captions are now available in English, Spanish, French and Portuguese.

  • Tile view in mobile, allowing you to see up to 48 people on a screen when using a mobile device or a tablet. 

  • Customizable backgrounds, to let students and teachers express themselves creatively while in class, and background blur to help reduce background distractions and keep the focus on the participant.

  • Advanced safety locks, to block anonymous users from joining and let teachers control who can chat and present in a meeting. We will launch more controls in the upcoming weeks, like muting all, and ending meetings for everyone.

An animation showing how Breakout Rooms work in Meet.

What’s new in Google Meet?

There are a number of new features we’ve launched in the last couple of months to enhance the learning experience:

  • More controls for educators:Educators can now mute everyone on the call at once so they can keep class on track. And coming soon, we’ll be launching new settings for school leaders to set policies for who can join their school’s video calls, and whether people from their school can join video calls from other schools.  

  • Coming soon, we’ll have Emoji reactions, allowing students to more easily engage and express themselves in Meet.

  • Later this year, Meet will support multiple hosts, making it easier for educators to partner with others helping facilitate the class.

  • Later this year,  meeting transcripts can help students who weren’t able to attend class stay up to date.

An animation showing different colored Meet chat bubbles populating in a transcript.

What additional Meet resources are available to me?

If you have questions or need help, check out our Tech Toolkit video, read our Guardian’s Guide to Google Meet or visit our Help Center page for troubleshooting information. For more tips and resources to help families navigate technology visit families.google. We hope we can continue helping improve the digital education experience and bring parents and guardians along, to support all families through these times.

Introducing the security center for G Suite—security analytics and best practices from Google

We want to make it easy for you to manage your organization’s data security. A big part of this is making sure you and your admins can access a bird’s eye view of your security—and, more importantly, that you can take action based on timely insights.

Today, we’re introducing the security center for G Suite, a tool that brings together security analytics, actionable insights and best practice recommendations from Google to empower you to protect your organization, data and users.

With the security center, key executives and admins can do things like:

1. See a snapshot of important security metrics in one place. 

Get insights into suspicious device activity, visibility into how spam and malware are targeting users within your organization and metrics to demonstrate security effectiveness—all in a unified dashboard.

Security Center GA - 1

2. Stay ahead of potential threats. 

Admins can now examine security analytics to flag threats. For example, your team can have visibility into which users are being targeted by phishing so that you can head off potential attacks, or when Google Drive files trigger DLP rules, you have a heads up to avoid risking data exfiltration.

Security Center - 2

3. Reduce risk by adopting security health recommendations.

Security health analyzes your existing security posture and gives you customized advice to secure your users and data. These recommendations cover issues ranging from how your data is stored, to how your files are shared, as well as recommendations on mobility and communications settings.  

Security Center GA - 3

Get started

More than 3.5 million organizations rely on G Suite to collaborate securely. If you’re a G Suite Enterprise customer, you’ll be able to access the security center within the Admin console automatically in the next few days. These instructions can help admins get started and here are some security best practices to keep in mind.

If you’re new to G Suite, learn more about about how you can collaborate, store and communicate securely.

Source: Google Cloud


Introducing the security center for G Suite—security analytics and best practices from Google

We want to make it easy for you to manage your organization’s data security. A big part of this is making sure you and your admins can access a bird’s eye view of your security—and, more importantly, that you can take action based on timely insights.

Today, we’re introducing the security center for G Suite, a tool that brings together security analytics, actionable insights and best practice recommendations from Google to empower you to protect your organization, data and users.

With the security center, key executives and admins can do things like:

1. See a snapshot of important security metrics in one place. 

Get insights into suspicious device activity, visibility into how spam and malware are targeting users within your organization and metrics to demonstrate security effectiveness—all in a unified dashboard.

Security Center GA - 1

2. Stay ahead of potential threats. 

Admins can now examine security analytics to flag threats. For example, your team can have visibility into which users are being targeted by phishing so that you can head off potential attacks, or when Google Drive files trigger DLP rules, you have a heads up to avoid risking data exfiltration.

Security Center - 2

3. Reduce risk by adopting security health recommendations.

Security health analyzes your existing security posture and gives you customized advice to secure your users and data. These recommendations cover issues ranging from how your data is stored, to how your files are shared, as well as recommendations on mobility and communications settings.  

Security Center GA - 3

Get started

More than 3.5 million organizations rely on G Suite to collaborate securely. If you’re a G Suite Enterprise customer, you’ll be able to access the security center within the Admin console automatically in the next few days. These instructions can help admins get started and here are some security best practices to keep in mind.

If you’re new to G Suite, learn more about about how you can collaborate, store and communicate securely.

8 swift steps G Suite admins can take to secure business data

Security doesn’t have to be complicated. With G Suite, admins can manage and help protect their users with minimal effort because we've designed our tools to be intuitive—like Vault, which helps with eDiscovery and audit needs, and data loss prevention, which helps ensure that your “‘aha”’ moments stay yours. Here are some key security controls that you can deploy with just a few clicks to get more fine-grained control of your organization's security.

1. Enable Hangouts out-of-domain warnings

If your business allows employees to chat with external users on Hangouts, turn on a setting that will show warnings to your users if anyone outside of your domain tries to join a Hangout, and split existing group chats so external users can’t see previous internal conversations. This substantially reduces the risk of data leaks or falling prey to social engineering attacks (From the Admin console dashboard, go to Apps > G Suite > Google Hangouts > Chat settings > Sharing options).

Tip 1

2. Disable email forwarding

Exercising this option will disable the automatic email forwarding feature for users, which in turn helps reduce the risk of data exfiltration in the event a user’s credentials are compromised.

Tip 2

3. Enable early phishing detection

Enabling this option adds further checks on potentially suspicious emails prior to delivery. Early phishing detection utilizes a dedicated machine learning model that selectively delays messages to perform rigorous phishing analysis. Less than 0.05 percent of messages on average get delayed by a few minutes, so your users will still get their information fast.
Tip 3

4. Examine OAuth-based access to third-party apps

OAuth apps whitelisting helps keep company data safe by letting you specifically select which third-party apps are allowed to access users’ G Suite data. Once an app is part of a whitelist, users can choose to grant authorized access to their G Suite apps data. This helps to prevent malicious apps from tricking people into accidentally granting access to corporate data.
Tip 4

5. Check that unintended external reply warning for Gmail is turned on.

Gmail can display unintended external reply warnings to users to help prevent data loss. You can enable this option to ensure that if your users try to respond to someone outside of your company domain, they’ll receive a quick warning to make sure they intended to send that email. Because Gmail has contextual intelligence, it knows if the recipient is an existing contact or someone your users interact with regularly, so it only displays relevant warnings. This option is on by default.

Tip 5

6. Restrict external calendar

To reduce the incidence of data leaks, make sure that Google Calendar details aren’t shared outside your domain. Limiting sharing to “free” or “busy” information protects you from social engineering attacks that depend on gleaning information from meeting titles and attendees.
Tip 6

7. Limit access to Google Groups

By setting default Google group access to private, you can limit external access to information channels that may contain confidential business information, like upcoming projects.
Tip 7

8. Google+ access restrictions

Make the default sharing setting for Google+ restricted and disable discoverability of Google+ profiles outside your domain. Both of these actions can help you control access to critical business information.

Tip 8
Tip 8

Every company has their own unique set of business requirements that need to work in rhythm with their security requirements. By evaluating and implementing some of these suggested security controls, you can make a marked difference in your company’s security posture—with just a few clicks. See this post for other security tips.

8 swift steps G Suite admins can take to secure business data

Security doesn’t have to be complicated. With G Suite, admins can manage and help protect their users with minimal effort because we've designed our tools to be intuitive—like Vault, which helps with eDiscovery and audit needs, and data loss prevention, which helps ensure that your “‘aha”’ moments stay yours. Here are some key security controls that you can deploy with just a few clicks to get more fine-grained control of your organization's security.

1. Enable Hangouts out-of-domain warnings

If your business allows employees to chat with external users on Hangouts, turn on a setting that will show warnings to your users if anyone outside of your domain tries to join a Hangout, and split existing group chats so external users can’t see previous internal conversations. This substantially reduces the risk of data leaks or falling prey to social engineering attacks (From the Admin console dashboard, go to Apps > G Suite > Google Hangouts > Chat settings > Sharing options).

Tip 1

2. Disable email forwarding

Exercising this option will disable the automatic email forwarding feature for users, which in turn helps reduce the risk of data exfiltration in the event a user’s credentials are compromised.

Tip 2

3. Enable early phishing detection

Enabling this option adds further checks on potentially suspicious emails prior to delivery. Early phishing detection utilizes a dedicated machine learning model that selectively delays messages to perform rigorous phishing analysis. Less than 0.05 percent of messages on average get delayed by a few minutes, so your users will still get their information fast.
Tip 3

4. Examine OAuth-based access to third-party apps

OAuth apps whitelisting helps keep company data safe by letting you specifically select which third-party apps are allowed to access users’ G Suite data. Once an app is part of a whitelist, users can choose to grant authorized access to their G Suite apps data. This helps to prevent malicious apps from tricking people into accidentally granting access to corporate data.

OAuth GIF

5. Check that unintended external reply warning for Gmail is turned on.

Gmail can display unintended external reply warnings to users to help prevent data loss. You can enable this option to ensure that if your users try to respond to someone outside of your company domain, they’ll receive a quick warning to make sure they intended to send that email. Because Gmail has contextual intelligence, it knows if the recipient is an existing contact or someone your users interact with regularly, so it only displays relevant warnings. This option is on by default.

Tip 5

6. Restrict external calendar

To reduce the incidence of data leaks, make sure that Google Calendar details aren’t shared outside your domain. Limiting sharing to “free” or “busy” information protects you from social engineering attacks that depend on gleaning information from meeting titles and attendees.
Tip 6

7. Limit access to Google Groups

By setting default Google group access to private, you can limit external access to information channels that may contain confidential business information, like upcoming projects.
Tip 7

8. Google+ access restrictions

Make the default sharing setting for Google+ restricted and disable discoverability of Google+ profiles outside your domain. Both of these actions can help you control access to critical business information.

Tip 8
Tip 8

Every company has their own unique set of business requirements that need to work in rhythm with their security requirements. By evaluating and implementing some of these suggested security controls, you can make a marked difference in your company’s security posture—with just a few clicks. See this post for other security tips.

Source: Google Cloud