Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

Why Is Your Google Account so Valuable?
The Internet has always been a tool to keep those who use it connected, and data stored on it shared and accessible. However, like any tool that evolves and changes over time, its purposes and uses change with it. The idea for what would become the Internet came from J.C.R. Licklider of MIT in 1962, who intended it to be a system of interconnected computers used to share information and programs across the entire world. This idea would become the World Wide Web with the help of Sir Tim Berners-Lee, who had this to say:

“Had the technology been proprietary, and in my total control, it would probably not have taken off. You can’t propose that something be a universal space and at the same time keep control of it.”

These ideals are still retained by today’s Internet; if anything, you might say it’s reached its peak. Social media use and network collaboration is at an all-time high, generally free of control by any central entity. These ideals have led to a demand for the preservation of net neutrality and open-access information, and while these are largely upheld, there are always exceptions to the rule.

While the Internet grew in capability, it also grew in utility. These utilities depend on security and privacy. Since so many people began to use the Internet to deal with confidential information, this increased the importance of security from both the perspective of an everyday user and a business. One of the companies that has helped shape this perspective is Google, a company that offers a plethora of services on both a user level and a business level.

You can’t discredit the importance of Google services for business, such as its G Suite applications and Gmail. Even on a general consumer level, many users find Google services helpful and important to their daily routine, to say the least. With Google security so important, take a moment to ask yourself how many online accounts have access to your Google account. What are you risking if your Google password is stolen by hackers looking to make a quick buck?

What You Risk
You can use your Google account to create other accounts, either by using your associated Gmail address or linking it directly, but what does that mean for security standards? It’s important to remember that this convenience comes at a price; linking an account to your Google account inevitably ties that account’s security to your Google account. This means that if your Google account is compromised, any accounts associated with it could also be at risk.

How Devastating Can It Be?
If you’re reading this on your desktop, you can click here to access your Google account. Under the Security section, you can review all devices that your Google account has been active on, as well as all third-party applications that access your account. You can even see all the websites that are using Google Smart Lock. Take a moment to review this list. Does it contain anything particularly sensitive? How about your bank account? If this is the case, it’s easy for anyone who has access to your Google account to access any accounts associated with your Google account from the simple virtue of being able to recover passwords and usernames for the account.

A Solution
This creates a conflict between two of any technology user’s priorities: convenience and security. Some might even be willing to sacrifice security if it means a little convenience (think using the same password for multiple accounts), but in the professional world, this can be dangerous if mishandled. There isn’t a magical button that will make your Google account secure, so you’ll have to use a collection of best practices and preventative measures to make sure your credentials are properly secured. Be sure to keep an eye out for data breaches and change passwords accordingly, as well as taking into account the following practices:

Passwords and Account Security
The Google account is basically a container of credentials for any account connected to it. This means that you need a strong password or passphrase to protect it. Make sure that your password is long, complex, and doesn’t include any identifiable words that might give it away to someone just guessing at it. Also, be sure to only access your Google account on personal devices rather than public ones, as you could be putting your account at risk this way. Public Wi-Fi is in a similar risk category; only access your account through a private or secured connection.

Two-Factor Authentication (2FA)
One of the better ways you can keep your Google account secure is by making it more difficult to access. A secondary code sent to your mobile device in the form of a text message, generated via Google Authenticator, or a call made to your mobile device, make it so that anyone with your password needs to work a little harder to access your account. Enabling this kind of 2FA decreases the chances that you’ll have problems with a cybercriminal taking over your account, since it’s highly unlikely that they will also have access to your mobile device, too. Google Authenticator is by far the most secure of the options presented for 2FA for your Google account.

Your Google account can be used to access one-time authentication codes that can be printed out and kept on your person, giving you immediate access to your account on the off-chance you don’t have your phone on you at that moment. If you run out of codes or lose the list, you can generate new ones easily enough.

To set up these features, log in to your Google account.

Overall, Google offers great ways to keep your account secure, as long as you take advantage of them. To learn more about how you can keep your accounts secure, reach out to us at (732) 291-5938.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 19 March 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

IT Budget Operating System Outsourced IT Machine Learning Mouse Managed IT services Encryption Comparison Authentication SharePoint Licensing Dark Data Remote Computing Travel Zero-Day Threat Vulnerability Google Drive Unified Threat Management Solid State Drive Tech Support Budget Notifications Tech Term Public Cloud Recovery Bitcoin Automobile High-Speed Internet Quick Tips Telephony Business Technology Automation Co-managed IT Hackers Downtime Computer 5G Information Artificial Intelligence Emoji Environment Halloween Cleaning Point of Sale Assessment Data Breach Infrastructure Experience Unified Communications Identity Theft Healthcare Tech Terms Read Only Break Fix Computing Social Productivity Bandwidth Data loss Typing Black Market Public Speaking Operations Taxes Windows Troubleshooting Disaster Resistance Upgrade Cybercrime Virtual Assistant Test RMM Data Backup Mobility Files Remote Monitoring Backups OneNote Personal Information Management End of Support Business Continuity Identity Access Control Scam Tip of the Week Crowdsourcing Microsoft Office Knowledge Holiday Managed IT Retail Administration Dark Web IT Services Processors Workplace Tips Writing Remote Worker Office Office Tips Cyberattacks Superfish Maintenance Spyware Augmented Reality Data Management Drones WPA3 Sync Refrigeration Tracking Privacy Safety Router Gmail USB Project Management Application Cortana Blockchain Mobile Cybersecurity Tablet Technology Tips Business Growth IT Consultant Internet Exlporer Windows 10 Information Technology Display Hacker Database User IT Support Facebook WannaCry Compliance Features Virtualization Wi-Fi Flexibility Backup and Disaster Recovery Best Practice Employees LiFi IBM Telephone Systems The Internet of Things How To Mobile Computing Alert Digital Internet Data Recovery VPN Money Hacks Social Networking Miscellaneous Browser Software Tips Proactive IT Mobile Security Regulations Smartphones Enterprise Content Management SaaS Best Practices Vulnerabilities Government Google Wallet Motion Sickness Microsoft Chromebook Printing Uninterrupted Power Supply Trending Technology Digital Payment Server Professional Services Passwords Big Data Google Calendar Websites Time Management Wasting Time Star Wars Virtual Reality Windows 7 Website Bring Your Own Device Corporate Profile Customer Relationship Management Bookmarks BYOD Computing Infrastructure Administrator Legal Password Gadgets Proactive Apple Network Security Google Maps Phone System Webcam Alerts Chrome ROI Private Cloud Address Disaster Recovery Cameras How To Undo BDR Google Hosted Solutions Law Enforcement Identities Finance Mobile Device Management Mobile Device Managment Security Cameras Electronic Medical Records Permissions Outlook IP Address Managed Service Multi-Factor Security Analytics Update Cables Touchscreen Social Media Mobile Device Language PDF Authorization Two-factor Authentication Heating/Cooling Server Management Company Culture Cache Theft Data storage Business Computing Computers Monitoring Unsupported Software Asset Tracking Deep Learning Save Money Lithium-ion Battery Data Security Digital Signature Data Upgrades Efficiency Mobile Office Malware Consultation Distributed Denial of Service Mirgation Enterprise Resource Planning Utility Computing Buisness Human Error Piracy IT service Staff Customer Service Techology Hotspot Wireless Unified Threat Management Help Desk 3D Printing MSP Managed Service Provider Software Tip of the week Connectivity IoT Health Search Saving Money Business Intelligence Programming GPS Innovation Cabling Google Docs Twitter Email Financial Entrepreneur iPhone Backup Wires Cookies Marketing Relocation CIO Chatbots Statistics Managing Stress Net Neutrality Meetings Technology Laws Gadget Networking Electronic Health Records Permission Analyitcs Content Filtering Printer Settings Paperless Office Small Business App Windows 8 Smart Technology Virtual Private Network Consulting IT Support Humor Education Remote Workers Apps Collaboration Bluetooth Conferencing Office 365 Lenovo Domains Business Disaster Hiring/Firing Fun Black Friday E-Commerce Competition Sports IT solutions Communication User Tips Current Events Migration Social Engineering CCTV Voice over Internet Protocol Spam PowerPoint Scary Stories Monitors Web Server Physical Security Mobile Data Managed IT Service Managed Services Provider Hard Disk Drive Screen Reader Patch Management Vendor Management Smartphone Phishing Users Hard Drive Hardware Recycling Robot Managed IT Services Consumers Virus Network Management Geography Antivirus Training Modem Servers Mail Merge Samsung Specifications Favorites File Sharing Storage Virtual Desktop Software as a Service Hacking Employee-Employer Relationship Applications Wearable Technology Notes Running Cable Botnet Cooperation Android Remote Monitoring and Management eWaste Downloads Hard Drives Cryptocurrency Redundancy Intranet Employer-Employee Relationship WiFi Documents Fraud Word Procurement Productivity Mobile Devices communications Windows 10 Hosted Solution Fleet Tracking Business Management IT Technicians Politics Save Time Data Warehousing Saving Time Cloud Computing Business Owner IT Management Security Nanotechnology Risk Management Document Management Shortcut Wireless Technology Error G Suite Presentation Staffing Work/Life Balance Smart Tech Development Cyber Monday Avoiding Downtime IT Consulting Legislation Microsoft Excel Network Congestion Supercomputer HIPAA Going Green Laptop Alt Codes Cost Management Computer Care YouTube Motherboard VoIP Computer Repair Ransomware VoIP Network Firefox History Internet of Things Instant Messaging Cloud Firewall User Error

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code