A hazard of cloud-based services is reputation hijacking — using the cover of a legitimate cloud service to do bad things. For example, you can’t block the domain “Google.com”, because it has legitimate purposes. So a network administrator is left in a difficult quandrary. As an example, Google Docs (specifically, Spreadsheets), is a playpen for […]
Latest Comments