MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Productivity Internet Hosted Solutions Backup Business Management google Computer Managed IT Services Disaster Recovery Mobile Devices Outsourced IT Microsoft communications VoIP Business Continuity Business IT Support Windows 10 Hardware Innovation Email User Tips Cybersecurity IT Services Data Backup Cybercrime Efficiency Saving Money Managed IT Mobile Device Management Server Ransomware Data Recovery Tech Term Small Business Apps Windows Mobility Operating System Data Productivity browser Law Enforcement Internet of Things Smartphone Office 365 Android Virtualization BDR Telephone Systems Save Money Quick Tips Passwords Money Phishing Cloud Computing Smartphones Hosted Solution Data Security Microsoft Office VPN BYOD Automation Managed Service Provider Password Holiday Information Technology Chrome Recovery Communication Facebook Google Drive Government Collaboration Hacking Avoiding Downtime IT Support Two-factor Authentication Alert Wireless Health Update Miscellaneous Computers Gadgets Risk Management Unsupported Software Vulnerability Social Media Best Practice Social upgrade Budget Data Breach Work/Life Balance Cost Management Data Management Wi-Fi App Application Network Tech Support Current Events Audit User Error Compliance Wireless Technology Data Protection Personal Information Politics Gmail Telephony Cleaning USB Save Time Office tips Applications Workplace Tips Private Cloud History Remote Computing Spam Proactive IT Identity Theft Social Engineering Managed IT Services Artificial Intelligence Streaming Media The Internet of Things Flexibility Shortcut Employer-Employee Relationship search Firewall Antivirus Content Filtering Battery Google Docs Management HaaS Hacker Solid State Drive Internet Exlporer Blockchain Automobile Mobile Security Value Devices Redundancy iPhone Commerce Mobile Computing Saving Time Transportation Google Assistant Cortana Office IT solutions Patch Management Computer Care Robot Windows 10 Phone System Fraud DDoS End of Support Legal Users Encryption Television Excel Wireless Charging Data Storage Apple Big Data Project Management Humor OneNote Disaster WiFi Education Vendor Management Router Going Green SaaS Bandwidth Data Loss Sports Samsung Marketing eWaste Hard Drives Licensing Unified Threat Management WannaCry Unified Communications IT budget Updates Analysis Running Cable Files Server 2008 Training Administrator Ali Rowghani Webinar Entertainment Lithium-ion battery Maintenance Conferencing HBO Microsoft Word Trending Mobile Upgrades Electronic Medical Records Financial Point of Sale App store Microsoft Excel Remote Monitoring Company Culture Access IT solutions HIPAA Financial Technology Device Security Gifts Relocation Professional Services Consultant Safety Black Market Identities File Sharing Smart Technology server installation dvd "cannot install required files" IT Management stock Windows 10s Printing Avoid Downtime PDF Travel Nanotechnology Shadow IT IoT Document Management Identity Storage WIndows Server 2008 tweet Hard Disk Drive Experience Spyware Credit Cards Text Messaging Tablets Root Cause Analysis Language Data Privacy calculator Twitter Computer Forensics Video Games FAQ NFL Augmented Reality control Virtual Reality Touchscreen Hard Drive Lifestyle Business Intelligence Scam Outlook WSJ Music PowerPoint Edge Charger Virus Word Laptop Uninterrupted Power Supply Exchange altivista Chromebook Legislation Distributed Denial of Service Managed IT Service Employer Employee Relationship iOS Analytics Wireless Internet Ciminal Proactive Windows Ink Touchpad Keyboard SBS Instant Messaging compaq Worker Commute Smart Tech Comparison Reputation Computer Accessories Advertising Regulation Mobile Device Computer Fan Gamification Evernote Websites Google Maps Wearable Technology Managing Stress hp Connectivity Specifications Screen Mirroring Sync Data storage Dark Web Books Memory Scalability MSP Networking Data Theft Software as a Service Meetings Hiring/Firing domain Chromecast Emails Content Filter Sales Administration Cast Adobe Students How To intranet Workers Computing Settings Benefits remote Yahoo Monitoring Retail Colocation Cache Monitors Thank You Emergency Congratulations Worker CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...