ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Google Is Increasing Security For High-Risk Users

Google Is Increasing Security For High-Risk Users

Wouldn’t it be great if you could take advantage of a built-in security feature that could lock down your Google services in the event of a potential data breach? Thanks to attacks on high-profile users, Google is now offering this service to those who are at considerable risk of having their accounts hacked. This type of advanced service, called the Advanced Protection Program, is only available to a select few, but it promises to assist in the challenge of protecting sensitive information.

Specifically, the Advanced Protection Program will be designed to help those who are most likely to experience troublesome hacking attacks, including those who work as election and campaign officials, those who are victims of domestic violence, and others who find themselves to be at risk. The service is marketed as greater security, while trading off some of the convenience that might be found with the base-level Google services.

Among the affected Google services are Gmail, Google Drive, and YouTube. Once someone has been onboarded into the Advanced Protection Program, their accounts will automatically be updated with all of the latest and greatest security solutions available for Google’s services. The implementation of this service is in light of the various high-profile hacking attacks associated with various officials during the 2016 United States presidential election. Google was forced to endure plenty of backlash in the aftermath of the John Podesta controversy in which his Gmail account was hacked via a phishing attempt. This new initiative by Google is an attempt to ensure that they don’t have to deal with this backlash again.

The tactic used by Google’s Advanced Protection Program is a security key. While a USB key is generally considered a better two-factor authentication practice, Google is also equipping users with a Bluetooth key verification process that can be used on both a smartphone or a laptop.

At the moment, Google’s Advanced Protection Program blocks access to information on your Google account by any third-party source--that is, any program that’s not developed by Google itself. Furthermore, it implements a slower account recovery process that’s more difficult for a hacker to replicate. While it takes away from some of the ease of recovery that Google users know and love, it makes for a more secure experience overall.

Would you take advantage of this new service from Google if need be? Let us know in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Google Hackers Privacy Cloud Backup Microsoft Business Computing Smartphones Innovation Hardware Small Business Data Business Cybercrime Software Ransomware Efficiency Malware User Tips Android Cybersecurity Productivity Managed IT Services VoIP Email Internet Mobile Devices Business Continuity Operating System Data Backup Social Media App Browser Server Automation Communication Safety Bring Your Own Device Law Enforcement Social Engineering Mobile Device Management Gadgets Business Management Upgrade Collaboration How To Chrome Spam Data Breach Computers Computer Windows Network Security Data Security Wi-Fi Public Cloud Windows 10 Recovery Quick Tips Redundancy Office 365 Avoiding Downtime Saving Money Network Internet Exlporer Data storage Money Disaster Recovery Router Cloud Computing Government Save Money Passwords Data Storage Windows 10 Miscellaneous The Internet of Things Outsourced IT Alert Bandwidth Hosted Solutions Unsupported Software Managed IT Services Telephone Systems Smartphone Word Phishing Physical Security Spam Blocking Artificial Intelligence Private Cloud Google Drive Downtime Multi-Factor Security Tech Support Conferencing Hiring/Firing Samsung Robot Flash Microsoft Office Vulnerability Facebook IBM Patch Management Travel Laptop Trending Shadow IT HBO Apps Emails Hybrid Cloud Communications Value Solid State Drive Data loss Supercomputer Files Scam Chromecast Touchpad Comparison Office Sync Audit Screen Mirroring Budget History Data Recovery Specifications Relocation Computer Fan DDoS Cast BDR Remote Monitoring Business Intelligence Netflix Outlook Telephony FENG Current Events User Error Update Gmail IT Support HaaS Humor YouTube Skype IT Management IT Services Knowledge Reputation Frequently Asked Questions Apple Start Menu Virtualization OneNote IT Plan Network Congestion End of Support Google Docs Customer Excel Settings Flexibility iPhone Monitor Tools Uninterrupted Power Supply IT Consultant Internet exploMicrosoft Productivity Going Green Website Hacking Black Market Tip of the week Marketing Root Cause Analysis Managed Service Provider NarrowBand Voice over Internet Protocol Office Tips Software Tips Advertising Internet of Things Windows Server 2008 Automobile Wireless Technology Managed IT Two-factor Authentication Cleaning BYOD webinar Computer Care Sports Windows 7 Windows 10s Meetings Networking Health Botnet Experience Mobile Device Employer Employee Relationship VPN Music Video Games Battery Webinar PDF Computer Accessories Loyalty Remote Computing Scalability Transportation Education IT solutions Information Technology Bluetooth Password SaaS Content Workplace Tips Benefits Computing Infrastructure Thank You Techology Audiobook Instant Messaging Firewall Applications Congratulations Worker Assessment Wearable Technology Entertainment Smart Technology WiFi Users Wireless Rootkit IT Support Television USB Holiday Two Factor Authentication Virtual Reality Training Public Computer Troubleshooting CrashOverride Worker Commute Vendor Management Mobility Big Data Risk Management Data Management Search Electronic Medical Records Charger Legal Books Politics How to Save Time Work/Life Balance Best Practice Emergency Keyboard