CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Proxy vs VPN

CyberSecurity - What are some things that get a bad rap, but are actually quite secure?

CyberSecurity – What are some things that get a bad rap, but are actually quite secure?

Cybersecurity is an important issue for everyone, from individuals to large organizations. There are many things that get a bad rap when it comes to cybersecurity, but that doesn’t mean they’re not secure. For example, PGP (Pretty Good Privacy) is a method of encrypting emails that is considered to be very secure. However, it can be difficult to set up and use. Another example is using very long passwords that are actually a sentence. This may seem like a security risk, but it’s actually more secure than a shorter password because it’s more difficult for hackers to guess. Additionally, changing the default port for certain services like databases can help to prevent hacking. Unplugging the ethernet cable may also seem like a security risk, but it’s actually one of the most effective ways to prevent data breaches. Finally, browser password managers are often considered to be insecure, but they’re actually quite secure if used properly. Cybersecurity is an important issue, and there are many things that can be done to help prevent hacking and data breaches.

There are a lot of CyberSecurity myths out there. People think that X, Y, and Z are the most secure way to do things when in reality, they are the least secure. The biggest myth is that PGP is unbreakable. PGP has been broken many times and is not a reliable form of CyberSecurity. Another myth is that very long passwords are secure. The problem with very long passwords is that they are difficult to remember and often get written down somewhere. If a hacker gets ahold of your password, they can easily access your account. The best way to prevent CyberSecurity breaches is to use MFA, OAuth, and two-step verification whenever possible. These methods make it much more difficult for hackers to gain access to your accounts. While they may not be foolproof, they are the best CyberSecurity measure available.

1- PGP

PGP is a Form of Minimalism

As a protocol, PGP is surprising simple. Here is what happens if you want to use it to securely send a message to someone:

  1. You get from them a PGP identity (public key). How you do that is entirely up to you.
  2. Your PGP program uses that identity to perform a single public key encryption of a message key.
  3. Then the message key is used to encrypt the message which is added to the encrypted message key to make the encrypted message.
  4. Your correspondent does the opposite operations to get the message.

If you want to sign your message then you:

  1. Hash the message.
  2. Do a public key signature operation on the hash and attach the result to the message.
  3. Your correspondent checks the signature from your PGP identity, which they have acquired somehow.

The simple key handling is where the minimalism comes from. It is why PGP can be used in so many non-email contexts.

As a contrast, consider the Signal Protocol for instant messaging. I will not attempt to describe Signal in any detail as I would get parts of it wrong. It would also make for a pointlessly long article. There is a high level description of the Signal protocol here. None of the following comments are intended to be critical, they are intended to give an idea of the level of complexity of the protocol in total:

  • Signal has at least 2 systems for creating forward secrecy. Each system requires a system to deal with loss of synchronization.
  • A Signal session requires the storage and maintenance of a lot of state information.
  • Signal normally uses a server based “prekey” system to deal with the case where a client is offline and thus is unable to negotiate.
  • Signal achieves partial deniability with a triple Diffie-Hellman key exchange. OpenPGP achieves complete deniability by not signing the message in the first place.
  • Supporting the Signal protocol in practice requires a separate system to store and protect past messages1). Since this is at odds with forward secrecy such a system will end up with a system to delete old messages.

The Signal Protocol is built on ideas from the Off the Record (OTR) protocol. Interestingly enough, OTR was intended to improve PGP by adding extra functionality. Signal adds functionality on top of the OTR functionality. So Signal could be considered the result of an attempt to improve something by making it more complex.

I believe that reliability and security are best achieved with simple systems. OpenPGP is a standard that describes such a system.

2- Very long passwords that are actually a sentence

It could be bad if you just came up with it and forget it, and people think it’s bad if it only has lowercase and no numbers or punctuation. But a 5-6 word sentence could be quite secure, especially if it’s a bit weird. “Lemons make a delicious snack in my house.”

3- Writing passwords down.

I tell all my old relatives to write their passwords down in a little notebook. As long as there isn’t someone there regularly I don’t trust, it is much better than using same password and if their physical security at their house is compromised, there are bigger concerns than a notebook of banking passwords.

We write down all the passwords to our most secure systems – but then we rip them in half and put them in 2 separate safes.

Did I say passwords? I meant encryption keys.

4- Changing default ports for certain services like dbs

Most of the gangs out there use tools that don’t do a full search, so they go through the default port list

5- MFA in general.

Takes 60 seconds to set up, and an additional 5s each time you use it, but can save you hours if not days of manual recovery efforts with support to regain access to a compromised account. Yet people don’t like the idea.

If you are using TOTP for your MFA, you can even put it right in the browser with a plug-in. I use this approach for work. It’s very convenient.

If you use a password manager that supports TOTP and auto type (e.g. KeePassXC) then you don’t even need to mess with it once you have it set up.

6- Oauth for 3rd party apps.

Those “sign into our app with your (Google, Microsoft, etc) account” things. As long as you trust the ID provider and the app, it’s usually secure. More so, considering it prevents password reuse, and you aren’t exposed if any of those 3rd party apps have a breach.

7- Two-step verification.

Yes it’s annoying to need two devices every time you want to log into your most precious accounts, but trust me, I’d rather take the extra 10 seconds to authorize a login than go through the hell of having my account breached.

8-Biometric Authentication.

The argument is that ‘you can’t change your face/finger’ but it is actually more secure than other ‘magic link’ providers.

Let me be clear, there are some providers that are still iffy on security. But there are also some that have device native authentication (you need the device to auth), they don’t store passwords or password hashes, and only has public keys.

One example of this is https://passage.id/ which is about as secure as you can get.

9- Zoom.

Yes, they had a bunch of issues at the start, but they fixed them. I would much rather work with a company that had security assessments and fixed the problems rather than a company which has never been assessed.

10- Unplugging the ethernet cable.

11- Browser password managers?

Rant moment: reasons cybersecurity fails

<Rant>

People don’t see value of putting effort in cybersecurity because they don’t see any material gains from it. The best thing they can see is nothing bad happening.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Gemini, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

No news isn’t good enough of a good news. This is enough to mostly ignore all cybersecurity advice altogether.

This is similar to people not taking care of themselves health-wise, because the best things they can see is not getting sick.

</Rant>

Why do cyber attackers commonly use social engineering attacks?

Hackers commonly use social engineering attacks because they can be very effective. By using social engineering, hackers can take advantage of people’s trusting nature and willingness to help others. They can also exploit the fact that people are often not well-informed about security and privacy issues. For example, a hacker might pose as a customer service representative and ask for someone’s password. Or, they might send an email that looks like it is from a trusted source, such as a bank or government agency, and ask the recipient to click on a link or download an attachment. If the person falls for the deception, the hacker can gain access to their accounts or infect their computer with malware. That is why it is important to be aware of these types of attacks and know how to protect yourself.

Cyber attackers commonly use social engineering attacks for a number of reasons. First, hacking into a person’s or organization’s computer systems is becoming increasingly difficult as security measures become more sophisticated. Second, even if a hacker is able to gain access to a system, they are likely to be discovered and caught before they can do any significant damage. Third, social engineering attacks allow hackers to bypass security measures and obtain sensitive information without being detected. Finally, social media platforms have made it easier for cyber attackers to obtain personal information about their targets and to carry out attacks. As a result, social engineering attacks are an attractive option for many cyber attackers.

To conclude:

Cybersecurity is often thought of as a complex and technical field, but there are actually many simple things that everyone can do to help stay safe online. For example, one way to protect your online communications is to use PGP encryption. This type of encryption is incredibly difficult for even the most skilled hacker to break, but it’s also easy to use. Another way to improve your cybersecurity is to use very long passwords that are actually a sentence. This may seem daunting, but using a phrase as your password makes it much harder for hackers to guess. Additionally, changing the default ports for certain services can help prevent unauthorized access. And finally, unplugging the ethernet cable when you’re not using it is a great way to physically block hackers from accessing your device. By following these simple tips, you can dramatically improve your cybersecurity and protect your privacy.

source: r/cybersecurity

Source: r/cybersecurity

  • Auto Patching
    by /u/Dizzy_Bridge_794 (cybersecurity) on July 26, 2024 at 5:50 pm

    So with the recent Fortune 500 outage that impacted some 8,000,000 computers they had the ability to not auto update. My companies core processor resells the product to its clients. Only one insisted on auto updates and was impacted. Do the risks associated with real time updates outweigh the benefits? Did any of these corporations recognize this risk and approve it their risk assessment processes? Change management control failed at the corporate level of every impacted company as well if the risk wasn’t recognized and accepted. submitted by /u/Dizzy_Bridge_794 [link] [comments]

  • Malwarebytes Shutdown
    by /u/Temporary_Hope_7198 (cybersecurity) on July 26, 2024 at 5:34 pm

    EvilBytecode/Malwarebytes-Shutdowner: Kill malawarebytes process. Can be ported to any programming language. (github.com) This project demonstrates how to terminate the Malwarebytes process. It is designed for educational purposes to illustrate basic methods for process management and termination. submitted by /u/Temporary_Hope_7198 [link] [comments]

  • Russian ransomware gangs account for 69% of all ransom proceeds
    by /u/DrinkMoreCodeMore (cybersecurity) on July 26, 2024 at 5:14 pm

    submitted by /u/DrinkMoreCodeMore [link] [comments]

  • DLP on AWS for EC2/S3/RDS
    by /u/opti2k4 (cybersecurity) on July 26, 2024 at 4:23 pm

    Hi, I have mix of Linux/windows EC2 (~30) running inside AWS, along with S3 and RDS (MSSQL). There is Cloud Storage Security available as 3rd party on AWS but I am not seeing them in any list of recognized DLP vendors. Can someone recommend anything? submitted by /u/opti2k4 [link] [comments]

  • Anyone have experience working for Mimecast?
    by /u/Few_Throat_5081 (cybersecurity) on July 26, 2024 at 4:18 pm

    I'm looking at a few positions at Mimecast (U.S.) and I was wondering if anyone had any personal experience with working for Mimecast? In terms of work life balance, compensation, work culture... etc. submitted by /u/Few_Throat_5081 [link] [comments]

  • Cybersecurity engineer vs GRC manager
    by /u/August724 (cybersecurity) on July 26, 2024 at 3:50 pm

    Hi all, looking for insight here. I've been in a GRC role the past 6 years and now a Manager 1 making 138K in MCOL. I have a CISA and CISSP and have been doing cybersecurity assessments, compliance assessments over NIST CSF and ISO, and IT audits. I feel like my potential both in growth for my career and salary is being capped. I networked with some sr.mgrs. at my company and they said they are currently at 175K. with not being able to cross 200K for atleast 3 more years in the sr.mgr. role. I have a fair amount of technical knowledge on cyber from my CISSP and GRC knowlege acquired. I'm already working long hours (55-60 hours/week) and have minimal work life balance which has taken a toll on my mental and physical health. Not to mention, I'm starting to find the work really boring and unfulfilling. Also, not being recognized for the contributions I'm making to the team. All extra rewards are given to the staff, seniors, and offshore staff I manage. I know the job market is not too good right now but wondering if anyone had experience in this, what career shift could I do? I've seen some posts on Linkedin where people have shifted to Cybersecurity Engineer / Information Security Engineer / Application Engineer. What is the work like? Pay wise and work life balance wise? I've seen some posts here on reddit where people switch from engineering to GRC too. Would it be wrong to switch out of GRC? Am I stuck in the GRC role forever? submitted by /u/August724 [link] [comments]

  • LinkedIn professional writers - is it really worth it?
    by /u/G1ric (cybersecurity) on July 26, 2024 at 3:49 pm

    Hi everyone, I’m a Senior DevSecOps Engineer and have been thinking of making a move to a new role. In the past, I’ve found new jobs solely by being contacted by recruiters on LinkedIn. I’m UK based and thankfully have been lucky enough to have a steady stream of messages from recruiters that are relevant or match my requirements for most of my career. However lately, I’m getting hardly any and most of the ones I have gotten are sponsored and completely irrelevant. This has led me to consider paying for professional CV and LinkedIn writing services - has anyone used these before? What’s the general consensus on them? My major concern is not being able to find one who has any understanding of InfoSec (much like most recruiters) and does a poor job of translating my experience. submitted by /u/G1ric [link] [comments]

  • Audit more efficiently
    by /u/HuskyLogic (cybersecurity) on July 26, 2024 at 3:36 pm

    When doing an audit for things like NIST or CIS, is there a tool that can automate some of the process? I know it can't all be automated but I'm just wondering if there is something. submitted by /u/HuskyLogic [link] [comments]

  • Become Cyber Essentials Auditor
    by /u/Emotional-Thanks8946 (cybersecurity) on July 26, 2024 at 2:59 pm

    If one of our customers want to gain their CE certification how can we go about getting qualified to deliver the certification? Currently if a customer comes to us wanting to get their CE certificate we will just out source it to another company. What are the requirments & training we need to be able to audit & pass our clients for CE? Where is the right place to start? submitted by /u/Emotional-Thanks8946 [link] [comments]

  • Synack Red Team, thoughts?
    by /u/Sea_Courage5787 (cybersecurity) on July 26, 2024 at 2:08 pm

    Im thinking about to give it a try. Anybody work with them, any kind of insight is helpfull. Thanks. submitted by /u/Sea_Courage5787 [link] [comments]

  • Common Cybersecurity Questions from Other Teams
    by /u/CyberSavvy2901 (cybersecurity) on July 26, 2024 at 2:07 pm

    I know that working in security often means fielding a lot of questions from colleagues in other departments. Besides the usual “Is this a phishing email?” what are the most common questions you get asked by people outside of the security team? submitted by /u/CyberSavvy2901 [link] [comments]

  • Top Hacker Movies!
    by /u/GivingBigTechEnergy (cybersecurity) on July 26, 2024 at 2:03 pm

    Ey up! Our first episode on top hacker movies has been very popular so we’re looking for ideas of other hacker movies good and bad (like MST3K bad!) for part two! So what should we talk about for part two of the topic on our podcast? This is what we’ve already reviewed: Hackers (1995) Sneakers (1992) The Net (1995) The Net 2.0 (2006) Jurassic Park (1993) Jumping Jack Flash (1986) Brazil (1985) The Italian Job (1969) War Games (1983) Electric Dreams (1984) Swordfish (2001) Mr Robot (TV(2015) Full show here: https://youtu.be/hfe7xFA6TaU?si=p9dsYPpStnu6x_xm submitted by /u/GivingBigTechEnergy [link] [comments]

  • If you could send one cybersecurity tip back in time to your younger self, what would it be?
    by /u/AIExpoEurope (cybersecurity) on July 26, 2024 at 11:21 am

    We've all made mistakes or had "aha" moments in our cybersecurity journeys. If you had the chance to send a single, crucial piece of cybersecurity advice back in time to your younger self, what would it be? submitted by /u/AIExpoEurope [link] [comments]

  • What is the most common phrase you hear when you tell people you work in cybersecurity?
    by /u/lone-wolf-x04 (cybersecurity) on July 26, 2024 at 10:27 am

    EDIT: thought I’d add some comments I’ve heard in, too. “So you can hack people on Instagram?” “That’s the place to be right now, lots of money” “Won’t AI do it all?” I was also trying to explain to someone what cybersecurity actually was, and she proceeded to ask “Is that like with aerials?” I had no idea what she meant at that point so just agreed. submitted by /u/lone-wolf-x04 [link] [comments]

  • Two-Step Phishing Campaign Exploits Microsoft Office Forms
    by /u/Specialist_Mix_22 (cybersecurity) on July 26, 2024 at 9:33 am

    submitted by /u/Specialist_Mix_22 [link] [comments]

  • Many .csv files (more than 50 files) created by legit svchost.exe
    by /u/jhonvi2 (cybersecurity) on July 26, 2024 at 7:58 am

    Hey! yesterday I was going over one of my organization's host timeline on MD, because it was suspicious. All of the sudden, I encounter the following: Legitimate signed process 'svchost.exe' has created several .csv files (more than 50 files) within miliseconds, with names like 'servicelayer_af.csv', 'servicelayer_da.csv', 'ar_it.csv' . All of them stored in the path 'C:\Program Files\WindowsApps\king.com.BubbleWitch3Saga_9.2.1.0_x64__kgqvnymyfvs32'. This path is related to a game that can be obtained from the Windows store called 'BubbleWitch3'. I looked up for info on whether this action is common with this game, but I have not found anything. It creates not only .csv files but also .css as 'console.css' and .js, 'console.js', .bat as 'autoexec.bat'. All type of files are also hosted in the already mentioned path 'C:\Program Files\WindowsAppsking.com.BubbleWitch3Saga_9.2.1.0_x64__kgqvnymyfvs32'. Here is a screenshot of an example .csv file created "Adv03_Interface_cs.csv" http://imgfz.com/i/kMGEdW7.png Process tree can be seen in the following URL: http://imgfz.com/i/ZnsP4HX.png submitted by /u/jhonvi2 [link] [comments]

  • What cybersecurity challenges are coming our way?
    by /u/Saran_RK (cybersecurity) on July 26, 2024 at 7:40 am

    Hey everyone, what do you think are going to be the biggest cybersecurity threats over the next 5 years? As technology evolves, we’re likely to see new challenges emerge. How can we prepare ourselves or adapt our strategies to stay ahead of these potential risks? Let’s share ideas on how to strengthen our defenses! submitted by /u/Saran_RK [link] [comments]

  • Custom detection rules
    by /u/Evocablefawn566 (cybersecurity) on July 26, 2024 at 3:15 am

    Hey all- I spend quite a bit of time using KQL and creating detection rules/queries. I’m curious, what are some of the best, favorite, or query you are most proud of? In my case, it’s a custom USB detection/usage rule, linked to specific groups. Nothing impressive, but it was harder than I expected to create. Once I got it working it felt pretty good knowing I got it to work. Curious to hear what you all say submitted by /u/Evocablefawn566 [link] [comments]

  • Israel tried to frustrate WhatsApp lawsuit over Pegasus spyware, leak suggests
    by /u/Any_Salary_6284 (cybersecurity) on July 26, 2024 at 1:21 am

    https://www.theguardian.com/news/article/2024/jul/25/israel-tried-to-frustrate-us-lawsuit-over-pegasus-spyware-leak-suggests submitted by /u/Any_Salary_6284 [link] [comments]

  • Month long interview process, going onto 4th round. What more could they want to know?
    by /u/Top-Kale-3670 (cybersecurity) on July 26, 2024 at 1:14 am

    Hi all, I'm going through a lengthy interview process with a very large name in the industry. I've gone through a screening and two technicals, now they want me to enter a 4th round with a Sr. Manager. This is for a MDR analyst position. I performed triage for round 3, which would be most of my day to day. I'm confused what more they would want to see from me to warrant another round. I'm beginning to get concerned that I don't have a high chance of being hired, or there is a stronger candidate being considered. I've spent a month now going through this process and it will be incredibly disappointing to be rejected after this much time. Any insight provided would be incredibly helpful. I have 4.5 YOE as a SOC analyst as well as dabbling in other non-analyst roles such as SOAR development. submitted by /u/Top-Kale-3670 [link] [comments]

  • DMARC reports
    by /u/juliocsmelo (cybersecurity) on July 26, 2024 at 1:02 am

    My current job have implemented DMARC as part of our security controls for email and now we have reports everyday. My question is: How do you manage this on daily basis? submitted by /u/juliocsmelo [link] [comments]

  • What was it like to get your first cybersecurity role?
    by /u/my_philosophy24 (cybersecurity) on July 25, 2024 at 8:09 pm

    The tech industry as a whole seems oversaturated was thinking of going to college for cybersec but it seems like a waste of time and money with no guaranty of employment submitted by /u/my_philosophy24 [link] [comments]

  • CrowdStrike backlash over $10 apology voucher for IT chaos
    by /u/uid_0 (cybersecurity) on July 25, 2024 at 6:56 pm

    submitted by /u/uid_0 [link] [comments]

  • What are some cybersecurity myths you have run across based on experience?
    by /u/BitionGang_33 (cybersecurity) on July 25, 2024 at 6:44 pm

    Would love to hear from a lower/ mid/ surface level in regards to detection engineering, best practices, cybersecurity as a career and just overall general user security, some myths and best practices you’ve learned over time Thought it’d be good to collect some things we could all look into over time ~ submitted by /u/BitionGang_33 [link] [comments]

  • Professionals who have succeeded in your respective careers in Cybersecurity , what what cybersecurity cert impacted your career the most?
    by /u/TheMthwakazian (cybersecurity) on July 25, 2024 at 12:02 pm

    I'm curious, if you were to pick only one (or 2 at most). Which cybersecurity cert impacted the upward trajectory of your career the most? Tell us your job role too to give us context. In addition, what do you think you could have done better? submitted by /u/TheMthwakazian [link] [comments]

  • CrowdStrike Outage Preliminary Post Incident Report
    by /u/Oscar_Geare (cybersecurity) on July 24, 2024 at 4:20 am

    submitted by /u/Oscar_Geare [link] [comments]

  • Mentorship Monday - Post All Career, Education and Job questions here!
    by /u/AutoModerator (cybersecurity) on July 22, 2024 at 12:00 am

    This is the weekly thread for career and education questions and advice. There are no stupid questions; so, what do you want to know about certs/degrees, job requirements, and any other general cybersecurity career questions? Ask away! Interested in what other people are asking, or think your question has been asked before? Have a look through prior weeks of content - though we're working on making this more easily searchable for the future. submitted by /u/AutoModerator [link] [comments]

Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)