MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer.

e-max.it: your social media marketing partner
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Privacy Best Practices Business Computing Hackers Network Security Software Malware Internet Hosted Solutions Backup Business Management google Managed IT Services Productivity Microsoft Computer Disaster Recovery Outsourced IT Mobile Devices Business Continuity Business IT Support Windows 10 communications VoIP User Tips Productivity IT Services Hardware Innovation Email Cybercrime Mobile Device Management Data Backup Mobility Windows Efficiency Managed IT Server Ransomware Cybersecurity Apps Smartphone Saving Money browser Save Money Telephone Systems Small Business Data Recovery Virtualization Operating System Law Enforcement Internet of Things Hosted Solution Quick Tips Android Data BDR Money VPN Information Technology Passwords Data Security Recovery Password Holiday Office 365 Microsoft Office Chrome BYOD Wireless App Alert Communication Health Miscellaneous Managed Service Provider Phishing Computers Risk Management Unsupported Software Facebook Government Cloud Computing Best Practice Social Media Work/Life Balance Budget Gadgets Smartphones Data Management IT Support upgrade Social Google Drive Hacking Avoiding Downtime Windows 10 search Automation Telephony USB Vulnerability Save Time Office tips Applications Private Cloud User Error History Managed IT Services Identity Theft Proactive IT Data Breach Flexibility Shortcut The Internet of Things Wi-Fi Firewall Workplace Tips Application Current Events Audit Collaboration Social Engineering Personal Information Wireless Technology Politics Two-factor Authentication Going Green iPhone Bandwidth Saving Time Cleaning Mobile Computing eWaste Office Transportation Phone System Spam Computer Care Robot Excel Legal Users Encryption Data Storage Remote Computing End of Support OneNote Artificial Intelligence Gmail Project Management Data Loss Humor Update Disaster Cost Management Marketing IT solutions Google Docs Employer-Employee Relationship SaaS DDoS Samsung Antivirus Content Filtering Network Sports Battery Data Protection HaaS Television Tech Support Compliance Redundancy Hacker Blockchain Streaming Media Internet Exlporer Apple Solid State Drive Commerce Automobile WiFi Cortana FAQ Document Management Patch Management Devices NFL Augmented Reality PDF Experience remote Lifestyle Business Intelligence Touchscreen Yahoo Charger Outlook Spyware Text Messaging Word Video Games Server 2008 Legislation Virtual Reality Managed IT Service Running Cable iOS Ali Rowghani Scam Wireless Charging Fraud Music Windows Ink Trending Comparison Computer Fan Employer Employee Relationship Evernote Regulation Edge Analytics Google Maps Laptop Uninterrupted Power Supply server installation dvd "cannot install required files" Keyboard Specifications Instant Messaging Screen Mirroring Dark Web stock Computer Accessories Networking Worker Commute Sync Ciminal Big Data Software as a Service Touchpad Meetings Mobile Device Sales Reputation Managing Stress Cast Emails tweet Workers Advertising Adobe Books Scalability Settings calculator Hiring/Firing Retail Education Data storage Router WannaCry Twitter Vendor Management Updates Licensing MSP control How To Benefits Conferencing Administration HBO Chromecast Webinar WSJ Microsoft Word Mobile intranet Exchange Microsoft Excel Unified Threat Management Distributed Denial of Service altivista Gifts Colocation IT solutions Professional Services IT budget Training Hard Drives Entertainment SBS Electronic Medical Records File Sharing Files Upgrades Windows 10s Lithium-ion battery compaq Point of Sale IT Management Maintenance Administrator Travel Nanotechnology Company Culture HIPAA Storage Black Market Wearable Technology Consultant Hard Disk Drive hp Smart Technology Credit Cards Relocation WIndows Server 2008 Device Security Access Tablets Identities Avoid Downtime Root Cause Analysis Value domain Shadow IT Worker CrashOverride Thank You Congratulations Cache Monitors Remote Monitoring Safety Emergency

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...