(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Increasing Security For High-Risk Users

Wouldn’t it be great if you could take advantage of a built-in security feature that could lock down your Google services in the event of a potential data breach? Thanks to attacks on high-profile users, Google is now offering this service to those who are at considerable risk of having their accounts hacked. This type of advanced service, called the Advanced Protection Program, is only available to a select few, but it promises to assist in the challenge of protecting sensitive information.

Specifically, the Advanced Protection Program will be designed to help those who are most likely to experience troublesome hacking attacks, including those who work as election and campaign officials, those who are victims of domestic violence, and others who find themselves to be at risk. The service is marketed as greater security, while trading off some of the convenience that might be found with the base-level Google services.

Among the affected Google services are Gmail, Google Drive, and YouTube. Once someone has been onboarded into the Advanced Protection Program, their accounts will automatically be updated with all of the latest and greatest security solutions available for Google’s services. The implementation of this service is in light of the various high-profile hacking attacks associated with various officials during the 2016 United States presidential election. Google was forced to endure plenty of backlash in the aftermath of the John Podesta controversy in which his Gmail account was hacked via a phishing attempt. This new initiative by Google is an attempt to ensure that they don’t have to deal with this backlash again.

The tactic used by Google’s Advanced Protection Program is a security key. While a USB key is generally considered a better two-factor authentication practice, Google is also equipping users with a Bluetooth key verification process that can be used on both a smartphone or a laptop.

At the moment, Google’s Advanced Protection Program blocks access to information on your Google account by any third-party source--that is, any program that’s not developed by Google itself. Furthermore, it implements a slower account recovery process that’s more difficult for a hacker to replicate. While it takes away from some of the ease of recovery that Google users know and love, it makes for a more secure experience overall.

Would you take advantage of this new service from Google if need be? Let us know in the comments section below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Network Data Disaster Recovery Upgrade Innovation Software Hardware Email Windows Save Money Saving Money Business Management Communication Computer Mobile Device Management User Tips Smartphones Browser Network Security Microsoft Office Virtualization WiFi Android Managed IT Services Windows 10 Holiday Smartphone communications Operating System Mobile Computing BYOD Hacking Social Media Remote Monitoring Avoiding Downtime Application IT Solutions Small Business Outsourced IT Computers Apple Cybercrime Proactive IT Chrome Big Data Passwords Marketing Automation Ransomware The Internet of Things Data Backup Alert Office Quick Tips Budget Collaboration Information Technology spam Going Green Managed IT Services Remote Computing Recovery Social Engineering Health Employer-Employee Relationship Mobility VPN Bring Your Own Device Managed IT Save Time Firewall Vendor Management Cybersecurity Telephone Systems App iPhone Wireless Technology Gadgets User Error Mouse PowerPoint Website Excel Redundancy Phone System Content Filtering Office 365 Downtime IT Support History Tablet Retail Memory Search Office Tips Bandwidth Compliance Networking Antivirus Gmail Lithium-ion battery Private Cloud Analytics Router Safety Government Intranet Outlook Meetings HaaS Money Cloud Computing Flexibility Fax Server Artificial Intelligence Black Market Law Enforcement Data Management Solid State Drive Two-factor Authentication Administration Internet of Things Data Storage Entertainment Apps Running Cable IT Consultant Internet Exlporer Data storage Value Word Skype Windows 10 Unified Threat Management Biometrics Business Owner Mobile Office Saving Time Document Management Customer Relationship Management Risk Management Hard Drives Online Currency Best Available Facebook People Programming Printer Data Recovery Network Congestion Trending Physical Security DDoS Unsupported Software BDR Robot Current Events Google Drive Public Cloud Environment Maintenance Humor Statistics Phishing Vulnerability SaaS How To Data Security Twitter Domains Start Menu HIPAA Voice over Internet Protocol Audit IaaS Bloatware Spam Blocking Crowdfunding HBO Cleaning Customer Service Touchscreen Mobile Multi-Factor Security Screen Mirroring Entrepreneur Frequently Asked Questions Tech Support Hacker Professional Services Computer Fan Lifestyle Cast Windows Media Player Cost Management Tip of the week Shadow IT Applications Wireless Files Science Tools FENG Data Protection Productivity Streaming Media Hiring/Firing Instant Messaging Shortcut Windows Server 2008 WIndows 7 Wi-Fi SharePoint Colocation Windows 8 Workers Business Intelligence Encryption Bluetooth Windows 7 Managing Stress Sports Monitor Hosted Solution eWaste Computing Infrastructure Tablets Botnet LinkedIn OneNote Data Warehousing Virus Notifications Company Culture USB Windows 8.1 Update Regulations YouTube Reputation Wearable Technology End of Support Debate Travel IT Management Computer Accessories Social Servers NarrowBand Work/Life Balance Customers Internet exploMicrosoft Video Surveillance Root Cause Analysis IT Plan Cameras Best Practice Social Networking Flash Consultant Chromecast Patch Management Advertising Education Analyitcs Print Server Software as a Service Data loss Printer Server Settings Sync Laptop Scam Worker Commute Distributed Denial of Service Piracy Update Computer Repair Software Tips Virtual Desktop Net Neutrality IT service Human Resources Telephony User Touchpad Relocation Hybrid Cloud Licensing Virtual Reality Google Docs Samsung Computer Care Uninterrupted Power Supply Training webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Troubleshooting Comparison Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Users Charger Scalability Politics Transportation How to