Google adds stronger safeguards for Workspace accounts
An automatic safety features notify users of risky account actions

Google is rolling out stronger protections for high-risk Workspace account actions, the firm revealed in a blog post on Tuesday.
The said actions, when perpetrated by cyber criminals, can have “far reaching consequences for the account owner or the organization it belongs to,” added the company.
Disabling two-step verification, allowing an app to access Google data, changing the account recovery email address or phone number, downloading account data, and changing the name on the account make up the list of “sensitive actions” identified by Google.
"This added layer of security helps to intercept bad actors who have gained access to a user's account, further protecting their data and your organization's sensitive information," the company said. "Additionally, these challenge attempts will be logged as an audit event allowing for further admin investigation."
To enhance security, Google’s Workspace accounts now feature a “Verify it’s You” prompt to address suspicious account activity. Users are now required to provide an additional verification factor, such as a hardware-based or text-based multi-factor authentication (MFA) prompt, to ensure that a requested action is legit and warranted.
This added layer of security makes it easier to stall bad actors who have logged into a user's account. The perpetrators’ intrusion attempts are also logged as an audit event to aid preliminary investigation by administrators.
All Google Workspace customers, including legacy G Suite Basic and Business clients, have access to the new safety features. However, at the time of this writing, SAML users are not supported.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
LaunchDarkly to "double down" on observability with Highlight acquisition
News Highlight's observability tools will be integrated into LaunchDarkly's Guarded Releases software deployment service
By Daniel Todd
-
Samsung Galaxy Tab S10 FE review
Reviews The Tab S10 FE retains the feel and core capabilities of Samsung's high-end S10 tablets, but compromises on the display and the performance
By Stuart Andrews
-
'Digital hide-and-seek': Workers are wasting hundreds of hours a year sourcing the information they need to carry out their role
News Knowledge workers globally are wasting a quarter of their working week tracking down information, new research from Atlassian has revealed.
By George Fitzmaurice
-
Untethered: How CIOs and CISOs are paving the way for the new hybrid workforce
Whitepaper Effective techniques to transition from exposed legacy infrastructure to an effective zero trust strategy
By ITPro
-
Unlocking the power of your digital services
Sponsored Businesses have invested significant cash into technology since COVID-19, but are they really getting their money's worth?
By ITPro
-
Delivering fast and secure digital experiences for the modern hybrid workforce
Whitepaper A new approach to digital experience monitoring that can monitor the health of all systems
By ITPro
-
Collaboration is the glue that holds your business together
SPONSORED A combination of productivity tools and cloud telephony can enable the best from your workforce
By ITPro
-
The future of work and the forgotten workforce
whitepaper How to deploy a mobile-first strategy so no one gets left behind
By ITPro
-
The case for an accelerated device refresh cycle
Whitepaper Achieving a more cost-effective device lifecycle overall
By ITPro
-
Employees are choosing how they work
Whitepaper And with the right secure digital strategy, this could be a great thing for your business: today and far into the future
By ITPro