Velocity Technology Partners Blogs

Google Is Becoming More Secure for Certain Users

Google Is Becoming More Secure for Certain Users

Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information that these select few can access.

Google intends to provide the most likely targets of hacking attacks and cyber surveillance with the Advanced Protection Program. This includes election and campaign officials, victims of domestic violence, and other individuals who may be targeted for various reasons. For the loss of some of the convenience that Google usually packs into their programs and services, those who use the Advanced Protection Program can have their information protected by increased security measures.

This program will affect many of the services that most people use in one form or another almost every day, including Google Drive, Gmail, and YouTube. After an individual has been brought onto the program, their accounts are automatically equipped with Google’s best security solutions.

The Advanced Protection Program is largely in response to the high-profile attacks that were leveraged against officials throughout the United States presidential election of 2016. Google was caught up in the aftermath of the controversy surrounding John Podesta and his Gmail account, which was breached in a phishing attack. By implementing the Advanced Protection Program, Google is working to ensure that this backlash isn’t repeated in the future.

The Advanced Protection Program relies on a security key, as well as a Bluetooth key verification process for use with a smartphone or laptop.

The Advanced Protection Program does not allow any program that isn’t developed by Google itself to access the information on your Google account. It also features a more hacker-resistant, slower account recovery process. While this admittedly makes the process more arduous for the user, it provides the more secure experience that the audience described above needs.

If you were in a position to use the Advanced Protection Program, would you? Sound off in the comments section with your answer.

Small Business Bill Promotes Technology Use
Tip of the Week: How to Better Use Your Smartphone...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Hybrid Cloud Gamification eWaste SaaS Work/Life Balance Data Theft Hosted Solutions Google Docs Safety Sync IT Management Windows Mobility Outsourced IT Data Breach Alert Wireless Charging Antivirus Hard Drive Virtualization User Tips Comparison Flexibility Word Connectivity Financial Managed IT services intranet Android Management Virus Screen Mirroring Updates Maintenance Application Lifestyle Microsoft Office Google Maps Shortcut Cortana Remote Monitoring Microsoft Gifts VoIp WiFi Passwords Internet of Things Compliance Data Sports Edge FAQ Innovation Websites Data Storage Data Privacy Hackers Server Tip of the Week Google Unified Communications Email Managed IT Project Management Chrome Artificial Intelligence Students Office 365 Commerce Streaming Media Backup IT Support Employer-Employee Relationship Internet Specifications Automation IT Services Smartphones Vendor Management History Saving Money Workers Law Enforcement VPN Computer Redundancy Managed Service Provider Content Filter User Error Twitter Business Continuity Monitoring Update Financial Technology Cleaning Google Drive Travel BYOD PowerPoint Content Filtering Adobe Networking IT budget Efficiency Business Management Software as a Service Patch Management HBO Softphones Router Bring Your Own Device Encryption Cast Telephone Systems Apps Analysis Congratulations IT Solutions Tech Support Social Engineering Best Practices Spam Wi-Fi Data Loss Microsoft Excel WIndows Server 2008 Privacy IT support Smartphone Windows 10 Computers Managed IT Services Browser Wireless Technology Windows Ink Credit Cards Marketing Cloud Computing MSP Collaboration Computer Forensics Audit Gmail Education Remote Computing WannaCry Licensing Data Recovery Phishing Emergency Apple Microsoft Word iPhone Blockchain Computing Identity Theft Proactive Politics OneNote Excel Thank You Small Business Vulnerability File Sharing Network Company Culture Evernote Fraud Risk Management Smart Tech Unsupported Software Legislation Wireless Internet Malware Outlook Hardware Mobile Devices Software Managing Stress Ransomware Retail Social Media Cost Management Government Value Google Assistant Mobile Device Management Money App Ciminal Data Management Security Communication Conferencing Identities Data Backup Holiday The Internet of Things Big Data Disaster Recovery Regulation Storage Two-factor Authentication Device Security Language Telephone Cybercrime Data Protection Technology Best Practice Proactive IT Cloud Network Security Business Computing Sales Memory Mobile Security Personal Information Productivity Tech Term App store Identity BDR Chromebook Devices Applications Business Legal Cybersecurity Communications Hosted Solution Data Security Charger Operating System Tablets Printing NFL Gadgets IoT Spyware