SlideShare une entreprise Scribd logo
1  sur  30
Gmail Security
Topics of Discussion:
• Gmail - Brief Information
• Why is Gmail Security Important?
• Security Features Provided By Gmail
• SecuringYour Gmail Account
• Interesting Facts & Cases
• How Can Quick Heal Help?
Gmail - Brief Information
• .
POLL 1
Why Is Gmail Security Important
• Your Gmail messages last for ever. So does the information inside
the Gmail message!
• Some sensitive data contained in Gmail Messages :
Banking Information
Account Numbers
Salary Slips
Personal Information
Photographs
Private Messages
Professional Information etc.
• Lastly For Google - "One Password,All Of
Google" i.e. same username password
combinations for Gmail,YouTube, Picasa,
Google+ and a plethora of other Google
Products.
• All the information on these platforms is at
risk with a hacked GmailAccount &Vice
Versa
Why Is Gmail Security Important?
Security Features
Provided By Gmail
Security Features Provided By Gmail
Attachment Scanner
• Gmail automatically scans every
attachment for viruses.
• If a virus is detected, the message is
rejected with a notification to the sender.
• Attachments with viruses cannot be
uploaded or downloaded in Gmail.
Security Features Provided By Gmail
Spam Filtering
• Text Filter: Filters messages containing
'Spammy Phrases' & 'Intentional
Misspellings'.
• Blacklists:Google maintains a list of
blacklisted email id's & their messages
invariably end up in the Spam folder of the
receivers.
• Client Filters:The spam filters use client
identity and history to block malicious e-
mails they send.
Security Features Provided By Gmail
HTTPS
• Gmail always uses an 'encrypted HTTPS
connection'
• This ensures, no one can intercept your
messages when you check or send an email.
POLL 2
SecuringYour Gmail
Account - A Step by
Step Guide
SecuringYour Gmail Account
Step I. Login to Gmail >> Go to Account
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step II. Click Get Started
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step III. Under Add Recovery Information add your phone number and alternate
email address.These will help Google reach you if any unusual activity is detected on
your account.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step IV.Click Done, and move to Check your recent activity section.
Here, you can check how many times your Gmail/Google account has been logged
into using browsers and apps.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepV. If everything looks good, move to the next check point called Check your
Account Permissions.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepVI. Once you are done with the Security Checkup, click Continue to account
settings.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepVII. HereYou will see an option for 2-step verification
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
Other StepsTo Boost Gmail Security
• Set Strong Passwords - A CombinationOf Uppercase & Lowercase letters, numbers &
Symbols. Avoid - DOB's, Name's, Spouse's names etc.
• Set Unique Passwords for every account -This ensures safety in case one of the accounts is
compromised
• Avoid Setting Auto Responders - They respond indiscriminately to forged and legitimate
email & when they reply to spam emails, they themselves become a source of spam.
• Avoid setting vacationAuto Responders with location Information.
• Always Sign Out once you are done.
POLL 3
Interesting Facts &
Cases
Interesting Fact
• Google Drive Offered 2GB Of Free Storage
For DoingA Quick Security Checkup Until
17th February 2015
• This clearly shows the importance Google
gives to the user Account Security.
Analysis Of Leaked Gmail Passwords -
Sep 2014
POLL 4
How Can Quick Heal
Help with Email
Security
How Can Quick Heal Help withYour
Email Security
Quick Heal Products give cloud-based email security that blocks spam, phishing, and
infected emails from reaching your Inbox.
• AntiSpam blocks spam, phishing, junk, and other unwanted mails from reaching your Inbox.
• Quick Heal Products use live, cloud-based protection to check for suspicious files restricting
malware before it reaches your inbox
How Can Quick Heal Help withYour
Email Security
Thank YouCorporateCommunications@quickheal.co.in
Follow us on:
Facebook -www.facebook.com/quickhealav
Twitter -www.twitter.com/quickheal
YouTube - www.youtube.com/quickheal
SlideShare - http://www.slideshare.net/QuickHealPPTs
Website -www.quickheal.com
Official Blog -www.blogs.quickheal.com
References:
• http://en.wikipedia.org/wiki/Gmail
• http://www.visualistan.com/2014/06/things-you-should-know-about-gmail.html
• http://www.upgrademag.com/web/infographic-things-know-gmail/
• http://money.cnn.com/2014/04/01/technology/gmail/
• http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/
• https://support.google.com/mail/answer/25760?hl=en
• https://support.google.com/mail/checklist/2986618?hl=en
• https://blog.lastpass.com/2014/09/the-scary-truth-about-your-passwords-an-analysis-of-the-gmail-leak.html/

Contenu connexe

Tendances

Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your businessMithi SkyConnect
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptHassanAli980906
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,ShivangiSingh241
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Data protection ppt
Data protection pptData protection ppt
Data protection pptgrahamwell
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital SignaturesEhtisham Ali
 

Tendances (20)

Email security
Email securityEmail security
Email security
 
Email phising and spoofing hurting your business
Email phising and spoofing hurting your businessEmail phising and spoofing hurting your business
Email phising and spoofing hurting your business
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Symmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.pptSymmetric and Asymmetric Encryption.ppt
Symmetric and Asymmetric Encryption.ppt
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Spoofing
SpoofingSpoofing
Spoofing
 
CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,CYBER SECURITY : DIGITAL SIGNATURE,
CYBER SECURITY : DIGITAL SIGNATURE,
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
Gmail introduction
Gmail introductionGmail introduction
Gmail introduction
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Hash Function
Hash Function Hash Function
Hash Function
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Email security
Email securityEmail security
Email security
 
Digital Signatures
Digital SignaturesDigital Signatures
Digital Signatures
 
Sms spam-detection
Sms spam-detectionSms spam-detection
Sms spam-detection
 

Similaire à Gmail Security

7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptxMumara Campaigns
 
สมัครgmail.pdf
สมัครgmail.pdfสมัครgmail.pdf
สมัครgmail.pdfMuhammad Waqas
 
Understanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy PrimerUnderstanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy PrimerHayden Sin
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterMike Felch
 
Secrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail InboxSecrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail InboxAffiliate Summit
 
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptxe-Definers Technology
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Temok IT Services
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxPiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxJohnSimLabayan2
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?Beau Bullock
 
Email and web security
Email and web securityEmail and web security
Email and web securityshahhardik27
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web PresenceRich Benjamin
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Cracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance ReportingCracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance ReportingMarketo
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 

Similaire à Gmail Security (20)

7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
สมัครgmail.pdf
สมัครgmail.pdfสมัครgmail.pdf
สมัครgmail.pdf
 
Understanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy PrimerUnderstanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy Primer
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
Secrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail InboxSecrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail Inbox
 
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web Presence
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Cracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance ReportingCracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance Reporting
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 

Plus de Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Plus de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Dernier

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfonteinmasabamasaba
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...chiefasafspells
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationJuha-Pekka Tolvanen
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2
 

Dernier (20)

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 

Gmail Security

  • 2. Topics of Discussion: • Gmail - Brief Information • Why is Gmail Security Important? • Security Features Provided By Gmail • SecuringYour Gmail Account • Interesting Facts & Cases • How Can Quick Heal Help?
  • 3. Gmail - Brief Information • .
  • 5. Why Is Gmail Security Important • Your Gmail messages last for ever. So does the information inside the Gmail message! • Some sensitive data contained in Gmail Messages : Banking Information Account Numbers Salary Slips Personal Information Photographs Private Messages Professional Information etc.
  • 6. • Lastly For Google - "One Password,All Of Google" i.e. same username password combinations for Gmail,YouTube, Picasa, Google+ and a plethora of other Google Products. • All the information on these platforms is at risk with a hacked GmailAccount &Vice Versa Why Is Gmail Security Important?
  • 8. Security Features Provided By Gmail Attachment Scanner • Gmail automatically scans every attachment for viruses. • If a virus is detected, the message is rejected with a notification to the sender. • Attachments with viruses cannot be uploaded or downloaded in Gmail.
  • 9. Security Features Provided By Gmail Spam Filtering • Text Filter: Filters messages containing 'Spammy Phrases' & 'Intentional Misspellings'. • Blacklists:Google maintains a list of blacklisted email id's & their messages invariably end up in the Spam folder of the receivers. • Client Filters:The spam filters use client identity and history to block malicious e- mails they send.
  • 10. Security Features Provided By Gmail HTTPS • Gmail always uses an 'encrypted HTTPS connection' • This ensures, no one can intercept your messages when you check or send an email.
  • 12. SecuringYour Gmail Account - A Step by Step Guide
  • 13. SecuringYour Gmail Account Step I. Login to Gmail >> Go to Account Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 14. SecuringYour Gmail Account Step II. Click Get Started Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 15. SecuringYour Gmail Account Step III. Under Add Recovery Information add your phone number and alternate email address.These will help Google reach you if any unusual activity is detected on your account. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 16. SecuringYour Gmail Account Step IV.Click Done, and move to Check your recent activity section. Here, you can check how many times your Gmail/Google account has been logged into using browsers and apps. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 17. SecuringYour Gmail Account StepV. If everything looks good, move to the next check point called Check your Account Permissions. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 18. SecuringYour Gmail Account StepVI. Once you are done with the Security Checkup, click Continue to account settings. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 19. SecuringYour Gmail Account StepVII. HereYou will see an option for 2-step verification Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 20. Other StepsTo Boost Gmail Security • Set Strong Passwords - A CombinationOf Uppercase & Lowercase letters, numbers & Symbols. Avoid - DOB's, Name's, Spouse's names etc. • Set Unique Passwords for every account -This ensures safety in case one of the accounts is compromised • Avoid Setting Auto Responders - They respond indiscriminately to forged and legitimate email & when they reply to spam emails, they themselves become a source of spam. • Avoid setting vacationAuto Responders with location Information. • Always Sign Out once you are done.
  • 23. Interesting Fact • Google Drive Offered 2GB Of Free Storage For DoingA Quick Security Checkup Until 17th February 2015 • This clearly shows the importance Google gives to the user Account Security.
  • 24. Analysis Of Leaked Gmail Passwords - Sep 2014
  • 26. How Can Quick Heal Help with Email Security
  • 27. How Can Quick Heal Help withYour Email Security Quick Heal Products give cloud-based email security that blocks spam, phishing, and infected emails from reaching your Inbox. • AntiSpam blocks spam, phishing, junk, and other unwanted mails from reaching your Inbox. • Quick Heal Products use live, cloud-based protection to check for suspicious files restricting malware before it reaches your inbox
  • 28. How Can Quick Heal Help withYour Email Security
  • 29. Thank YouCorporateCommunications@quickheal.co.in Follow us on: Facebook -www.facebook.com/quickhealav Twitter -www.twitter.com/quickheal YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Website -www.quickheal.com Official Blog -www.blogs.quickheal.com
  • 30. References: • http://en.wikipedia.org/wiki/Gmail • http://www.visualistan.com/2014/06/things-you-should-know-about-gmail.html • http://www.upgrademag.com/web/infographic-things-know-gmail/ • http://money.cnn.com/2014/04/01/technology/gmail/ • http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ • https://support.google.com/mail/answer/25760?hl=en • https://support.google.com/mail/checklist/2986618?hl=en • https://blog.lastpass.com/2014/09/the-scary-truth-about-your-passwords-an-analysis-of-the-gmail-leak.html/