Archive for December, 2016

Understanding Phishing, Part 2: Understanding Google’s Hack Prevention Methods

Written by Best Computer Magazines. Posted in Uncategorized

Gmail recovery

With so many G Suite cybersecurity threats from government-based hackers, it’s important not to ignore the alerts that Google sends out.

Post-election, these threats have been increasingly more prevalent among esteemed journalists and educators, and Google apps backup services are more critical than ever. With simple phishing techniques, hackers can access your accounts and leak sensitive information to the public or to potentially dangerous sources.

Fortunately, Gmail recovery and security tools ensure that the account holder is the only one to log into the account. While Google sends alerts to users when it identifies suspicious activity, users also have to be proactive about protecting their data.

Here are some cybersecurity tips for making sure that Google is able to secure your account:

Set up a recovery phone number and email
Not only will this help with your Gmail recovery in case you lose your password, but it will also warn you in case your account is logged into from a new device. While you may be logged into your account from multiple devices — your phone, laptop, or desktop — any new logins are registered suspiciously. If your account is hacked, you’ll be able to take notice, file a report, and see where the activity is coming from.

Check your connected devices
While you’re at it, review which devices already have access to your account. It’s possible that a hacker has already authenticated their device, so you won’t get a notification. Make sure that only your devices come up.

Review which apps and websites have access to your Gmail and Google Drive
Eliminate access from any apps you no longer use. You can view how much access and what they do with your information by expanding the tabs next to each app’s logo, but it’s best to get rid of them altogether when in doubt.

Opt for two-step verification
In Google’s email to affected account holders, the company recommends enabling Google 2-step verification. This means that you will need to verify a code, which is sent to your mobile device, any time you log in on a new device. If someone tries to access your account elsewhere, you’ll get an email or SMS message sent to you that shares the code. The code is only valid for 30 seconds and will expire after that, so you’ll need to log in fast.

Since 6% of all computers experience data loss each year, G Suite is extremely helpful for document recovery and sharing. But with so much potential for phishing and data breaches,you can never be too safe. That’s why so many people are investing in Google drive and Gmail recovery tools.

Google’s recovery system isn’t perfect, and for those who work with sensitive information, cybersecurity is a huge concern.

Spinbackup provides additional third-party services that can help ensure the security of your Google account and data in the cloud.