4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity Workplace Tips VoIP Saving Money Computer User Tips Upgrade Miscellaneous Windows 10 Virtualization Mobile Devices Mobile Device Management Data Server Network Security Mobile Computing Alert Email Communication Network Save Money Microsoft Office Small Business communications Quick Tips Smartphone Mobile Office Information Technology Social Media Smartphones BYOD Going Green Apps Health Android Office Browser Gadgets Operating System Chrome Application Ransomware Managed IT Services Outsourced IT Managed IT Tablet WiFi Mobility Holiday Firewall Avoiding Downtime Productivity Disaster BDR Risk Management Cybersecurity Best Practice Search Data Management Cybercrime The Internet of Things Telephone Systems Passwords Remote Computing Unified Threat Management IT Solutions Spam Saving Time Hacking History Remote Monitoring VPN Apple Employer-Employee Relationship Facebook Budget Vendor Management Automation Hard Drives Proactive IT Office Tips User Error Law Enforcement iPhone Customer Relationship Management Collaboration Phishing Password Wireless Technology Hosted Solution Data Recovery Computers Money Big Data Recovery Phone System Marketing Content Filtering Data Backup Gmail Router Humor Government Administration Work/Life Balance Wearable Technology Antivirus Lithium-ion battery Shortcut Maintenance PowerPoint Social Office 365 Virus Vulnerability Current Events Telephony Printer Bring Your Own Device USB Analytics Encryption Data Protection Data Security Computer Repair SaaS App Audit Cost Management HaaS Intranet Bandwidth Business Intelligence Printer Server Laptop OneNote Users Politics Personal Information Social Engineering Windows 8 Education Trending Net Neutrality Wireless Private Cloud Unsupported Software Tech Support Google Drive Cloud Computing Outlook Save Time Point of Sale IT COnsultant Identity Theft Two-factor Authentication Streaming Media Solid State Drive Managing Stress Excel Sports Flexibility Uninterrupted Power Supply online currency Travel Samsung Wi-Fi Emergency Artificial Intelligence Social Networking Customer Service Update Applications Biometrics IT Support Retail Efficency Virtual Reality Windows 10 hacker Meetings Transportation Battery Instant Messaging Robot Emails Computer Care Display HIPAA Automobile Entertainment Benefits End of Support Augmented Reality Data Storage Computer Accessories DDoS Network Congestion Paperless Office Mouse Internet Exlporer Compliance Fax Server Help Desk Internet of Things Workplace Nokia systems Regulations Nanotechnology Tablets Value Hard Disk Drive Employer Employee Relationship Worker Commute Operating Sysytem hack Cameras Root Cause Analysis PDF Twitter User HBO Science Files NFL best practices Scalability Virtual Desktop Cortana Surge Protector Presentation CrashOverride Safety Bluetooth Text Messaging Television Best Available IT Management Chromecast Word data breach 3D Printing IT Technicians How To Legislation Settings Upgrades WIndows Server 2008 SharePoint Administrator Windows Ink Hard Drive risk management Training ISP Colocation Consultant Patch Management The Blindside Of Teamwork Uograde Access Google Maps Images Busines Continuity Company Culture Black Market Programming Blogging Networking Near Field Communication Commerce Touchscreen Regulation IT Security Software as a Service Cleaning Experience Website Human Resources IT consulting Sync Keyboard Running Cable Avoid Downtime Data Loss iOS OneDrive Music Reliable Computing Managed IT Service Adobe Wiring Managed IT Services Hiring/Firing Amazon Information Co-managed IT Bloatware Data storage Google Docs Computer Fan Books Licensing Smart Technology Video Games Debate Document Management Microsoft Excel Lifestyle Dark Web Data Breach Ebay Branding Advertising Screen Mirroring Computing Distributed Denial of Service Legal Touchpad File Sharing Mobile Device Managed Security WIndows 7 Cast Storage Inbound Marketing Windows 10s Scam eWaste Taxes IT service Tutorial Supercomputer Electronic Medical Records Domains IT Budget Reputation Buisness Comparison Gift Giving Youtube Microblogging Specifications Sales Shadow IT Relocation Managed Service Provder Webinar Webinar Mobile IT solutions Professional Services