MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer. your social media marketing partner


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 22 November 2017
If you'd like to register, please fill in the username, password and name fields.

Tag Cloud

Security Tip of the Week Cloud Technology Privacy Best Practices Business Computing Hackers Software Malware Hosted Solutions Backup Network Security google Internet Productivity Microsoft Computer Disaster Recovery Business Continuity Managed IT Services Windows 10 VoIP Business IT Support IT Services Outsourced IT Innovation User Tips Hardware Mobile Devices Business Management communications Mobility Managed IT Productivity Ransomware Mobile Device Management Windows Efficiency Email Smartphone Server Cybercrime Saving Money Save Money Telephone Systems Small Business Virtualization Operating System Data Backup Law Enforcement Cybersecurity Hosted Solution Quick Tips Apps Android Data BDR Money VPN Information Technology Passwords browser Recovery Password Microsoft Office Data Recovery Chrome BYOD Communication Wireless Health Miscellaneous Managed Service Provider Computers Unsupported Software Facebook Government Cloud Computing Work/Life Balance Budget Smartphones Data Management Office 365 upgrade Social Google Drive Hacking Avoiding Downtime Automation search Politics Phishing App Telephony Alert Managed IT Services USB Save Time Office tips Applications Private Cloud Risk Management Proactive IT Best Practice Social Media Data Security Shortcut Gadgets Workplace Tips Wi-Fi Holiday Firewall Application Current Events Audit Personal Information Going Green Spam iPhone Bandwidth Mobile Computing Transportation Saving Time Cleaning Data Storage Office Robot Computer Care Phone System History User Error Remote Computing End of Support Encryption Users Identity Theft Gmail Internet of Things Artificial Intelligence The Internet of Things Google Docs Flexibility Humor Update Disaster IT solutions Cost Management Data Protection Employer-Employee Relationship DDoS SaaS IT Support Network Sports Samsung Antivirus Television Content Filtering Commerce Battery Social Engineering HaaS Hacker Solid State Drive Streaming Media Internet Exlporer Apple Windows 10 Wireless Technology Compliance WiFi Automobile Vulnerability Value Word Avoid Downtime PDF Two-factor Authentication Legislation Managed IT Service Shadow IT Excel remote Document Management iOS eWaste Windows Ink Yahoo Experience Text Messaging Comparison Regulation Server 2008 Computer Fan Running Cable Google Maps Ali Rowghani OneNote Video Games Data Breach Trending Specifications Screen Mirroring Virtual Reality Scam Sync Dark Web Software as a Service Music Meetings Legal Emails Laptop Uninterrupted Power Supply Sales Cast Employer Employee Relationship Adobe server installation dvd "cannot install required files" Data Loss stock Analytics Settings Instant Messaging Marketing Touchpad Retail Keyboard Computer Accessories Licensing Worker Commute Reputation Mobile Device tweet Big Data Advertising HBO Managing Stress Webinar Mobile calculator Data storage Microsoft Excel Twitter Books Scalability control Education IT solutions Hiring/Firing Vendor Management Professional Services Collaboration Router Administration Chromecast File Sharing WSJ How To IT Management Exchange Windows 10s Benefits Distributed Denial of Service Travel altivista Nanotechnology Colocation Hard Drives Unified Threat Management Tech Support Storage WIndows Server 2008 SBS Hard Disk Drive Files Administrator Training Lithium-ion battery Tablets compaq Entertainment Root Cause Analysis Upgrades Cortana Electronic Medical Records Patch Management Point of Sale Wearable Technology Access Company Culture NFL hp HIPAA Augmented Reality Relocation Touchscreen Consultant Lifestyle Business Intelligence Black Market Outlook domain Smart Technology Emergency CrashOverride Worker Thank You WannaCry Cache Congratulations Monitors Remote Monitoring Safety

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...