Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

Why Is Your Google Account so Valuable?
The Internet has always been a tool to keep those who use it connected, and data stored on it shared and accessible. However, like any tool that evolves and changes over time, its purposes and uses change with it. The idea for what would become the Internet came from J.C.R. Licklider of MIT in 1962, who intended it to be a system of interconnected computers used to share information and programs across the entire world. This idea would become the World Wide Web with the help of Sir Tim Berners-Lee, who had this to say:

“Had the technology been proprietary, and in my total control, it would probably not have taken off. You can’t propose that something be a universal space and at the same time keep control of it.”

These ideals are still retained by today’s Internet; if anything, you might say it’s reached its peak. Social media use and network collaboration is at an all-time high, generally free of control by any central entity. These ideals have led to a demand for the preservation of net neutrality and open-access information, and while these are largely upheld, there are always exceptions to the rule.

While the Internet grew in capability, it also grew in utility. These utilities depend on security and privacy. Since so many people began to use the Internet to deal with confidential information, this increased the importance of security from both the perspective of an everyday user and a business. One of the companies that has helped shape this perspective is Google, a company that offers a plethora of services on both a user level and a business level.

You can’t discredit the importance of Google services for business, such as its G Suite applications and Gmail. Even on a general consumer level, many users find Google services helpful and important to their daily routine, to say the least. With Google security so important, take a moment to ask yourself how many online accounts have access to your Google account. What are you risking if your Google password is stolen by hackers looking to make a quick buck?

What You Risk
You can use your Google account to create other accounts, either by using your associated Gmail address or linking it directly, but what does that mean for security standards? It’s important to remember that this convenience comes at a price; linking an account to your Google account inevitably ties that account’s security to your Google account. This means that if your Google account is compromised, any accounts associated with it could also be at risk.

How Devastating Can It Be?
If you’re reading this on your desktop, you can click here to access your Google account. Under the Security section, you can review all devices that your Google account has been active on, as well as all third-party applications that access your account. You can even see all the websites that are using Google Smart Lock. Take a moment to review this list. Does it contain anything particularly sensitive? How about your bank account? If this is the case, it’s easy for anyone who has access to your Google account to access any accounts associated with your Google account from the simple virtue of being able to recover passwords and usernames for the account.

A Solution
This creates a conflict between two of any technology user’s priorities: convenience and security. Some might even be willing to sacrifice security if it means a little convenience (think using the same password for multiple accounts), but in the professional world, this can be dangerous if mishandled. There isn’t a magical button that will make your Google account secure, so you’ll have to use a collection of best practices and preventative measures to make sure your credentials are properly secured. Be sure to keep an eye out for data breaches and change passwords accordingly, as well as taking into account the following practices:

Passwords and Account Security
The Google account is basically a container of credentials for any account connected to it. This means that you need a strong password or passphrase to protect it. Make sure that your password is long, complex, and doesn’t include any identifiable words that might give it away to someone just guessing at it. Also, be sure to only access your Google account on personal devices rather than public ones, as you could be putting your account at risk this way. Public Wi-Fi is in a similar risk category; only access your account through a private or secured connection.

Two-Factor Authentication (2FA)
One of the better ways you can keep your Google account secure is by making it more difficult to access. A secondary code sent to your mobile device in the form of a text message, generated via Google Authenticator, or a call made to your mobile device, make it so that anyone with your password needs to work a little harder to access your account. Enabling this kind of 2FA decreases the chances that you’ll have problems with a cybercriminal taking over your account, since it’s highly unlikely that they will also have access to your mobile device, too. Google Authenticator is by far the most secure of the options presented for 2FA for your Google account.

Your Google account can be used to access one-time authentication codes that can be printed out and kept on your person, giving you immediate access to your account on the off-chance you don’t have your phone on you at that moment. If you run out of codes or lose the list, you can generate new ones easily enough.

To set up these features, log in to your Google account.

Overall, Google offers great ways to keep your account secure, as long as you take advantage of them. To learn more about how you can keep your accounts secure, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Friday, 24 January 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Network Security Software Internet IT Services Windows 10 Productivity Computer Managed Service Provider Backup Data Backup Ransomware Innovation Mobile Devices Business Continuity Smartphone Outsourced IT Google Upgrade Android Data Hardware Efficiency User Tips Data Recovery Disaster Recovery Social Media Managed IT services Browser Communication IT Support Workplace Tips IT Support Small Business Data Management Cloud Computing Managed IT Services Business Management Smartphones App Miscellaneous Internet of Things Holiday Microsoft Office Phishing Network Office Server Remote Monitoring Windows WiFi Facebook Cybersecurity communications Password VoIP Office 365 Paperless Office Artificial Intelligence Gmail Spam Big Data Passwords Tech Term Encryption Save Money Customer Relationship Management Bandwidth Firewall Collaboration Windows 10 Document Management Apps Hosted Solution Recovery Unified Threat Management Employer-Employee Relationship Saving Money Risk Management Robot Word Work/Life Balance Managed IT Infrastructure Hacker Chrome Tip of the week Content Filtering Vendor Management Apple Compliance Avoiding Downtime Downtime Mobile Device Management Wi-Fi Customer Service Office Tips Operating System How To Windows 7 Remote Computing Analytics Government Money Computers BYOD Data loss Project Management BDR Outlook Business Technology Education Telephone Systems File Sharing Healthcare Cybercrime Health Managed Service Automation Hacking Going Green Vulnerability Alert Social Mobile Computing Help Desk Website Printing Tech Support Data Security Data storage Applications Computing Software as a Service IT Management Two-factor Authentication Settings Virtual Reality Business Growth Training Mobile Device Presentation Antivirus SaaS The Internet of Things Redundancy Tablet Augmented Reality Upgrades Specifications Automobile IBM Budget Running Cable Access Control End of Support User Mouse Bring Your Own Device Search Sports Legal Retail IT service Cortana Display Virtualization Best Practice Administration Twitter Lithium-ion battery Laptops Politics Monitors Business Owner Patch Management Travel Solid State Drive IT solutions Identity Theft Safety Google Drive Scam Websites Marketing Physical Security Wireless Technology Regulations Taxes Wireless Botnet Competition VPN Net Neutrality Assessment Samsung Proactive Server Management Licensing Meetings YouTube Information Technology Virtual Private Network Smart Technology Consultation Unified Communications Digital Payment Storage Humor Remote Monitoring and Management HIPAA Maintenance Router Mobile Security Computer Care LiFi Analyitcs IT Consulting Language Time Management Printer Company Culture Telephone Halloween Asset Tracking Refrigeration Migration Employees Mobility Black Friday Cabling Web Server Update Staffing Nanotechnology Gadgets Dark Web Data Breach Computing Infrastructure Network Management Deep Learning Fun Vulnerabilities Mobile VoIP Scary Stories 3D Printing Remote Workers Chatbots Zero-Day Threat Cyber Monday Administrator Cameras VoIP Chromebook GPS IoT Proactive Maintenance Data Warehousing Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Network Congestion Geography Windows Server 2008 Unsupported Software Information Undo Identity Backup and Disaster Recovery flu season Disaster CCTV Digital Emoji Tracking iPhone IP Address Utility Computing Processor Lenovo Microsoft Excel Unified Threat Management Cooperation Downloads Alt Codes Gadget Cables Co-Managed IT Mobile Data Monitoring Hacks RMM Shortcut Fort Worth Uninterrupted Power Supply Spyware Mobile Office Superfish Blockchain Business Telephone business communications systems Staff Multi-Factor Security Typing Wires Buisness Consulting Current Events Procurement flu shot G Suite How To Processors Cost Management Active Directory Permissions Internet Protocol Flexibility Heating/Cooling Google Calendar Cryptocurrency Knowledge PowerPoint Remote Worker Fort Worth IT Motion Sickness Hard Disk Drive Fraud Firefox Supercomputer Google Docs Hard Drive Windows Server Networking Consumers MSP VoIP streamlines Operations Electronic Health Records Servers Legislation Bitcoin Experience Writing Personal Information Social Networking Professional Services DFW IT Service IT Consultant IT Budget Recycling User Management business network infrastructure Wearable Technology Cyberattacks Windows 8 Machine Learning Social Engineering Computer Repair eWaste Domains Motherboard Virtual Assistant IT Sevices Techology Internet Exlporer Cleaning Notifications 5G Management Batteries Entrepreneur Application Bookmarks Statistics Relocation Software Tips Webcam Users Electronic Medical Records Environment Public Speaking Google Wallet Voice over Internet Protocol Mail Merge Distributed Denial of Service Disaster Resistance data services Crowdsourcing Dark Data Enterprise Resource Planning Remote Work WPA3 IT Technicians Favorites Bluetooth Technology Tips Private Cloud Point of Sale Corporate Profile Troubleshooting Drones Modem Address Managed IT Service Proactive IT Hotspot Quick Tips User Error Mobile File Management Laptop Fleet Tracking Hard Drives Mirgation Conferencing Comparison Error History WannaCry Virtual Desktop Phone System Cookies Manufacturing Break Fix

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code