(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Increasing Security For High-Risk Users

Google Is Increasing Security For High-Risk Users

Wouldn’t it be great if you could take advantage of a built-in security feature that could lock down your Google services in the event of a potential data breach? Thanks to attacks on high-profile users, Google is now offering this service to those who are at considerable risk of having their accounts hacked. This type of advanced service, called the Advanced Protection Program, is only available to a select few, but it promises to assist in the challenge of protecting sensitive information.

Specifically, the Advanced Protection Program will be designed to help those who are most likely to experience troublesome hacking attacks, including those who work as election and campaign officials, those who are victims of domestic violence, and others who find themselves to be at risk. The service is marketed as greater security, while trading off some of the convenience that might be found with the base-level Google services.

Among the affected Google services are Gmail, Google Drive, and YouTube. Once someone has been onboarded into the Advanced Protection Program, their accounts will automatically be updated with all of the latest and greatest security solutions available for Google’s services. The implementation of this service is in light of the various high-profile hacking attacks associated with various officials during the 2016 United States presidential election. Google was forced to endure plenty of backlash in the aftermath of the John Podesta controversy in which his Gmail account was hacked via a phishing attempt. This new initiative by Google is an attempt to ensure that they don’t have to deal with this backlash again.

The tactic used by Google’s Advanced Protection Program is a security key. While a USB key is generally considered a better two-factor authentication practice, Google is also equipping users with a Bluetooth key verification process that can be used on both a smartphone or a laptop.

At the moment, Google’s Advanced Protection Program blocks access to information on your Google account by any third-party source--that is, any program that’s not developed by Google itself. Furthermore, it implements a slower account recovery process that’s more difficult for a hacker to replicate. While it takes away from some of the ease of recovery that Google users know and love, it makes for a more secure experience overall.

Would you take advantage of this new service from Google if need be? Let us know in the comments section below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency Business IT Support VoIP Miscellaneous IT Services Managed Service Provider Email Server Workplace Tips Disaster Recovery Business Continuity Network Innovation Data Windows Upgrade Software Hardware Business Management Computer Network Security Save Money Saving Money Communication Smartphones Android Mobile Device Management Browser Smartphone Virtualization Managed IT Services Holiday User Tips Microsoft Office communications WiFi Outsourced IT Windows 10 Social Media Operating System Computers Mobile Computing Hacking Chrome Data Backup Small Business BYOD Proactive IT Remote Monitoring Avoiding Downtime Cybercrime IT Solutions Application Alert Apple Information Technology Office Passwords Budget Ransomware Managed IT Services Collaboration Marketing Social Engineering Big Data The Internet of Things Employer-Employee Relationship Quick Tips Automation Data Recovery Mobility Recovery Health Going Green Bring Your Own Device VPN Remote Computing Telephone Systems spam Gadgets Bandwidth Compliance Two-factor Authentication Managed IT Cloud Computing Wireless Technology User Error App BDR Cybersecurity Vendor Management Save Time Firewall iPhone How To Office 365 Internet of Things Networking IT Support Artificial Intelligence Office Tips Windows 10 Vulnerability Gmail PowerPoint Lithium-ion battery Website Excel Risk Management Phone System Content Filtering Money Private Cloud Downtime Antivirus History Mouse Tablet Value Redundancy Retail Memory Analytics Router Search Black Market Customer Relationship Management Data Management Best Available People Intranet Internet Exlporer IT Management Programming Law Enforcement Data storage Network Congestion Biometrics Trending Solid State Drive Unsupported Software Hard Drives Humor Workers IT Consultant Statistics Apps Facebook Business Owner OneNote Saving Time Identity Theft Data Security DDoS Outlook Physical Security Document Management Robot Online Currency Credit Cards Work/Life Balance Environment Google Drive Flexibility Printer SaaS Administration Safety Entertainment Running Cable Public Cloud Current Events Government Data Storage Skype Maintenance Unified Threat Management Phishing Meetings HaaS Word Mobile Office Business Intelligence Fax Server HIPAA Hacker LinkedIn Online Shopping Virus Windows 7 Spam Blocking Cost Management Botnet Specifications Shadow IT Data Warehousing Debate Keyboard Science Evernote Computer Accessories Regulations Wireless Streaming Media Instant Messaging Touchscreen Travel Millennials Shortcut Windows 8 Video Surveillance Wireless Charging Cameras Servers SharePoint Computer Fan Encryption Consultant Workforce Sports IT Plan Education Applications Bluetooth Tablets Files Fiber-Optic Monitor Printer Server Flash eWaste Software as a Service FENG Notifications Productivity Password Telecommuting YouTube Worker Commute Piracy Wi-Fi USB Colocation Cables Reputation Sync Wearable Technology User Update Social Remote Work NarrowBand Software Tips Licensing Hosted Solution Samsung Computing Infrastructure Unified Communications Customers Telephony Google Docs Best Practice Twitter Social Networking Chromecast Analyitcs Crowdfunding End of Support Company Culture Theft Start Menu Windows 8.1 Update Voice over Internet Protocol Audit Mobile Device Laptop HBO Settings Distributed Denial of Service Internet exploMicrosoft Cortana Mobile Multi-Factor Security Root Cause Analysis Screen Mirroring Virtual Desktop Human Resources Fraud Touchpad Windows Media Player Frequently Asked Questions IT service Patch Management Virtual Reality Advertising Google Apps Relocation Professional Services Lifestyle Data loss Uninterrupted Power Supply Cast Training Amazon Print Server Tip of the week Domains Hiring/Firing IaaS Scam Bloatware Infrastructure WIndows 7 Tools Data Protection Cleaning Charger Customer Service Amazon Web Services Windows Server 2008 Entrepreneur Hybrid Cloud Net Neutrality Password Manager Computer Repair Managing Stress Comparison Tech Support Computer Care webinar Benefits PDF Business Mangement Loyalty Conferencing Windows 10s Smart Technology Recycling Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games Knowledge Audiobook Netflix Scalability Politics Users Transportation How to