4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware Workplace Tips VoIP Mobile Devices User Tips Saving Money Computer Miscellaneous Virtualization Upgrade Windows 10 Mobile Device Management Network Security Data Server Mobile Computing Email communications Alert Network Save Money Microsoft Office Communication Small Business Social Media Quick Tips Smartphone Information Technology Smartphones BYOD Going Green Mobile Office Health Android Office Managed IT Services Apps Outsourced IT Operating System Gadgets Chrome Application Ransomware Browser Managed IT WiFi Cybersecurity Holiday Firewall The Internet of Things Avoiding Downtime Mobility Disaster Productivity Tablet Data Recovery History Best Practice Data Management Data Backup Remote Computing Cybercrime Unified Threat Management Passwords IT Solutions Spam Telephone Systems BDR Risk Management Search Remote Monitoring Hacking VPN Apple Facebook Vendor Management Marketing Hard Drives Employer-Employee Relationship Budget Saving Time Automation Customer Relationship Management Collaboration Office Tips Wireless Technology Law Enforcement Phishing Password Big Data Hosted Solution Computers Content Filtering Money Proactive IT Recovery Phone System User Error iPhone Maintenance PowerPoint Virus Antivirus Work/Life Balance Current Events Shortcut Social Office 365 Printer Bring Your Own Device USB Telephony Analytics Encryption Gmail Router Government Humor Administration Wearable Technology Vulnerability Lithium-ion battery Printer Server SaaS Data Protection Audit Laptop HaaS OneNote Users Business Intelligence Education Trending Windows 8 Net Neutrality Social Engineering Tech Support Politics Data Security Personal Information Outlook Private Cloud Wireless Point of Sale Unsupported Software IT COnsultant App Cloud Computing Computer Repair Google Drive Cost Management Save Time Intranet Bandwidth Excel Identity Theft Solid State Drive Social Networking Flexibility Sports Efficency Travel Redundancy Data Storage Samsung Customer Service Wi-Fi Update Artificial Intelligence Biometrics Emergency Retail Display Virtual Reality Applications Meetings Augmented Reality hacker Paperless Office Transportation Instant Messaging Emails Network Congestion Fax Server HIPAA Computer Care Battery Robot Workplace Entertainment Help Desk Benefits Automobile Streaming Media DDoS Computer Accessories End of Support Uninterrupted Power Supply Mouse Compliance IT Support online currency Windows 10 Internet Exlporer Two-factor Authentication Internet of Things Managing Stress Value Sync Cameras Employer Employee Relationship Data Loss ISP iOS User Science Worker Commute Hard Drive Managed IT Service Operating Sysytem Adobe PDF Managed IT Services Virtual Desktop Presentation Google Docs Scalability Programming Computer Fan Files Bluetooth Blogging Best Available Uograde Images IT Technicians Licensing Text Messaging Safety Microsoft Excel How To Dark Web Chromecast SharePoint Website Upgrades Screen Mirroring Training File Sharing OneDrive Administrator Teamwork Busines Continuity Consultant Cast Colocation Amazon Windows 10s Networking Co-managed IT Near Field Communication The Blindside Of Company Culture systems Black Market Wiring Nanotechnology Access Touchscreen Information Tablets Hard Disk Drive Human Resources IT consulting Lifestyle IT Security Cleaning Debate hack Root Cause Analysis Running Cable Ebay Computing Experience HBO NFL Avoid Downtime best practices Reliable Computing Keyboard Cortana CrashOverride Bloatware Music IT Management Word data breach Hiring/Firing Legislation Settings Data storage Nokia Books WIndows Server 2008 Windows Ink Video Games risk management Branding Smart Technology Twitter Document Management Distributed Denial of Service Data Breach Patch Management Advertising Google Maps Legal WIndows 7 Surge Protector Storage Television Inbound Marketing Mobile Device Commerce Touchpad eWaste 3D Printing Regulations Managed Security Regulation Scam Software as a Service Taxes Conferencing Microsoft Word Domains Gift Giving Supercomputer Gifts Device Security Electronic Medical Records Microblogging Youtube IT Budget Webinar Devices Sales Credit Cards Reputation Mobile Managed Service Provder IT solutions Buisness Spyware Webinar FAQ Professional Services Charger Shadow IT Wireless Charging Relocation WannaCry Tutorial Evernote Comparison Workers Specifications Updates IT service