SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
THREE STEPS TO SECURE GMAIL
BACKUPIFY – AUGUST 2012
3 STEPS TO SECURE GMAIL
Backupify, Inc. 2
INTRODUCTION
In this three-step article we address challenges around email security including a
look at specialized Gmail settings and best practices to keep your email secure.
Giving someone keys to your email account - voluntarily or involuntarily - is
equivalent to giving them keys to commit identity theft. These days we get
everything emailed to us - receipts for purchases, credit card and bank account
statements and loan documents. It's unquestionably worth investing time to make
sure your work area is secure.
Think of your access to email in three layers: the computer you're using, the email
application itself, and your habits while online. The sum of these three layers is
your overall Gmail security level; a weakness at any point can zero out the whole
equation. We'll dissect each Gmail access layer and point out possible security
pitfalls.
PART ONE: YOUR COMPUTER
It makes sense to start with securing your computer since that's the foundation of
Gmail access. The first order of business is to check for updates to the computer's
operating system (OS) – which for most users is either Microsoft Windows or
Apple OS X.
In Microsoft Windows, click Start > All Programs > and click on Windows Update.
In the window that comes up, click the Check For Updates link (you'll need to be
online to do this). Windows Update will find and automatically select the most
important updates; all you have to do is click install and possibly restart when it's
finished.
In Mac OS X, click the Apple menu > Software Update. This will open the App
Store and display a list of available updates; click Update All to begin the process.
It's of vital importance to keep your operating system up-to-date; the OS controls
all Internet communication on your computer. Any vulnerability there will affect all
of your online interaction!
3 STEPS TO SECURE GMAIL
Backupify, Inc. 3
Next let’s check if your web browser is up-to-date; this is almost as important as
the OS since the browser is the one processing all the Internet traffic, Gmail
included.
Internet Explorer: patches for Internet Explorer will automatically be applied with
Windows Update (see above).
Firefox: open Firefox and click the Firefox button at the top. Mouse over Help and
click About Firefox; it will check for updates and start the download. Click the
Apply Update button when it shows up.
Google Chrome: Click the wrench icon to the right of the address bar and then
About Google Chrome; it will automatically check for and apply updates.
Apple Safari: for OS X users, updates will be applied by using Software Update for
the OS. For Windows users, launch Apple Software Update (Start > All Programs >
and click on Apple Software Update) to begin the process.
The last step to secure your computer is to make sure anti-virus software is
installed such as Norton or McAfee. Microsoft Security Essentials is free and a
solid alternative to paid solutions for Windows users if you don't already have
anti-virus. Keep in mind this software is a last line of defense; it will deal with any
malicious software that gets through your OS and browser.
PART TWO: CHANGE GMAIL AND GOOGLE ACCOUNT SETTINGS
You can setup two-step verification on your Google Account to go beyond
simple password security. You'll have to enter not only a password but also a code
sent to your phone by Google in order to access your account. This means
someone trying to hack your Gmail account will need not only your password but
also your phone to get in. It's a no-brainer to set this up. Google has a two-step
verification walkthrough here.
Another important setting pertaining to Gmail itself is the use of a secure or SSL
connection. An SSL connection encrypts the data going out of and coming into
3 STEPS TO SECURE GMAIL
Backupify, Inc. 4
your computer; this means the data is unreadable even if intercepted; it can only
be decrypted by your computer and the server on the other end.
Login to Gmail and click the gear icon on the right side of the screen; then click
Settings. The fifth category down is Browser Connection; select Always Use HTTPS.
Then scroll down and click the Save Changes button.
PART THREE: GOOD PRACTICES TO STAY SAFE
You can defeat all of the above security precautions if you get up and walk away
from your computer without locking it or at the very least, signing out of Gmail.
This is especially true of computers other than your own in public places, such as
hotels.
Tip: on public computers, make use of a web browser's privacy mode. Press Ctrl +
Shift + P to enable privacy mode in Internet Explorer and Firefox; in Google
Chrome, press Ctrl + Shift + N; in Apple Safari click the gear icon and then Private
Browsing (or in Mac OS X, choose Safari > Private Browsing). The browser won't
remember any history or passwords in private mode. Remember to close the
browser though!
The last area we’ll address concerns passwords. Even if you don't write them down
it's still possible for someone to guess your password. The solution is changing
your password often – and making it something hard to guess! Your pet's name is
not acceptable. Ideally make the password a phrase instead of a single word;
include lower and upper case letters, at least one number and a special symbol
such as an exclamation point. “1 L0ve to Re@d!” is a good example.
CONCLUSION
The tips in this article aren't once-and-done tasks - it's necessary to rinse and
repeat to keep your Gmail security at its best. Check for software updates on a
3 STEPS TO SECURE GMAIL
Backupify, Inc. 5
regular basis, change your passwords, and please never get up from your
computer without signing out of Gmail or locking your computer. Letting someone
voluntarily or involuntarily have access to your email is equivalent to giving them a
license to commit identity theft!
ABOUT BACKUPIFY
Backupify is the leading provider of backup and restore solutions for SaaS
applications including Google Apps, Salesforce, Facebook, Twitter, and more.
Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over
200,000 users trusting us with more than 500 million documents, two billion email
messages and 350 terabytes of data.
WHY BACKUP CLOUD DATA?
Your data is one of the most critical assets of your business. Like any important
asset, it should be insured. While most SaaS providers, including Google and
Salesforce, offer state-of-the-art disaster recovery capabilities that protect you
from some forms of data loss, you are still at risk for data loss due to user error,
hacked accounts and third-party application bugs. To fully replicate your on-
premise backup capabilities in the cloud, you need the ability to perform granular
restores, and to retain the control that comes from having your own secure
second copy of the data in your SaaS applications.
FIND OUT MORE
If you're interested in the peace of mind you get from an automated Google Apps
or Salesforce backup solution, feel free to contact us directly at
info@backupify.com.
 Web http://www.backupify.com
 Phone 1.800.571.4984
 Twitter http://twitter.com/backupify
3 STEPS TO SECURE GMAIL
Backupify, Inc. 6
Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names
may be the trademarks or registered trademarks of their respective owners.
© 2012 Backupify, Inc. Item: GAT-WP-EN-200110608

Contenu connexe

En vedette

Powerbreathe - Final Presentation
Powerbreathe - Final Presentation Powerbreathe - Final Presentation
Powerbreathe - Final Presentation Leo Cheng
 
Expeditie mont blanc
Expeditie mont blancExpeditie mont blanc
Expeditie mont blancElisabeth
 
General Overview 100901
General Overview  100901General Overview  100901
General Overview 100901tjbates1
 
Innovation Time Off | #howVietnamWorksworks
Innovation Time Off | #howVietnamWorksworksInnovation Time Off | #howVietnamWorksworks
Innovation Time Off | #howVietnamWorksworksChris Shayan
 
Nhungbaihoccuocsong
NhungbaihoccuocsongNhungbaihoccuocsong
Nhungbaihoccuocsongbita89
 
Presentazione prix italia2011
Presentazione prix italia2011Presentazione prix italia2011
Presentazione prix italia2011CSP Scarl
 
MLA Style Guide
MLA Style GuideMLA Style Guide
MLA Style Guideclover66
 
Ecomondo - gestione relitti navali
Ecomondo - gestione relitti navaliEcomondo - gestione relitti navali
Ecomondo - gestione relitti navalimcm&partners
 
Smart Players or Dumb pipes - Digital banking trends 2012
Smart Players or Dumb pipes - Digital banking trends 2012Smart Players or Dumb pipes - Digital banking trends 2012
Smart Players or Dumb pipes - Digital banking trends 2012Shay Rosen (שי רוזן)
 
Agartala12 uttarakhand hpsi
Agartala12 uttarakhand hpsiAgartala12 uttarakhand hpsi
Agartala12 uttarakhand hpsikitturashmikittu
 
Project management at a UX focused digital agency
Project management at a UX focused digital agencyProject management at a UX focused digital agency
Project management at a UX focused digital agencyCyber-Duck
 
D:\getting a charge out of sceience
D:\getting a charge out of sceienceD:\getting a charge out of sceience
D:\getting a charge out of sceienceguest5ac3f31
 
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Abraham Pattikawa
 
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...CSP Scarl
 
Jarvis Pain Assessment
Jarvis Pain AssessmentJarvis Pain Assessment
Jarvis Pain AssessmentJoanVNAF
 

En vedette (20)

Powerbreathe - Final Presentation
Powerbreathe - Final Presentation Powerbreathe - Final Presentation
Powerbreathe - Final Presentation
 
Expeditie mont blanc
Expeditie mont blancExpeditie mont blanc
Expeditie mont blanc
 
General Overview 100901
General Overview  100901General Overview  100901
General Overview 100901
 
Get Results With Email Marketing
Get Results With Email MarketingGet Results With Email Marketing
Get Results With Email Marketing
 
Arvoredeamigos
ArvoredeamigosArvoredeamigos
Arvoredeamigos
 
Innovation Time Off | #howVietnamWorksworks
Innovation Time Off | #howVietnamWorksworksInnovation Time Off | #howVietnamWorksworks
Innovation Time Off | #howVietnamWorksworks
 
Nhungbaihoccuocsong
NhungbaihoccuocsongNhungbaihoccuocsong
Nhungbaihoccuocsong
 
Presentazione prix italia2011
Presentazione prix italia2011Presentazione prix italia2011
Presentazione prix italia2011
 
MLA Style Guide
MLA Style GuideMLA Style Guide
MLA Style Guide
 
Ecomondo - gestione relitti navali
Ecomondo - gestione relitti navaliEcomondo - gestione relitti navali
Ecomondo - gestione relitti navali
 
Smart Players or Dumb pipes - Digital banking trends 2012
Smart Players or Dumb pipes - Digital banking trends 2012Smart Players or Dumb pipes - Digital banking trends 2012
Smart Players or Dumb pipes - Digital banking trends 2012
 
Mobility 2012 A multi-screen organization
Mobility 2012 A multi-screen organizationMobility 2012 A multi-screen organization
Mobility 2012 A multi-screen organization
 
Agartala12 uttarakhand hpsi
Agartala12 uttarakhand hpsiAgartala12 uttarakhand hpsi
Agartala12 uttarakhand hpsi
 
Project management at a UX focused digital agency
Project management at a UX focused digital agencyProject management at a UX focused digital agency
Project management at a UX focused digital agency
 
D:\getting a charge out of sceience
D:\getting a charge out of sceienceD:\getting a charge out of sceience
D:\getting a charge out of sceience
 
Managerial roles
Managerial rolesManagerial roles
Managerial roles
 
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
 
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
Living Labs ovvero il possibile contributo delle ICT ai Presidi Territoriali ...
 
Jarvis Pain Assessment
Jarvis Pain AssessmentJarvis Pain Assessment
Jarvis Pain Assessment
 
Ekta kapoor
Ekta kapoorEkta kapoor
Ekta kapoor
 

Plus de Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data ProtectionDatto
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your SchoolDatto
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. PublicDatto
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessDatto
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 

Plus de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

3 Steps to Secure Gmail

  • 1. THREE STEPS TO SECURE GMAIL BACKUPIFY – AUGUST 2012
  • 2. 3 STEPS TO SECURE GMAIL Backupify, Inc. 2 INTRODUCTION In this three-step article we address challenges around email security including a look at specialized Gmail settings and best practices to keep your email secure. Giving someone keys to your email account - voluntarily or involuntarily - is equivalent to giving them keys to commit identity theft. These days we get everything emailed to us - receipts for purchases, credit card and bank account statements and loan documents. It's unquestionably worth investing time to make sure your work area is secure. Think of your access to email in three layers: the computer you're using, the email application itself, and your habits while online. The sum of these three layers is your overall Gmail security level; a weakness at any point can zero out the whole equation. We'll dissect each Gmail access layer and point out possible security pitfalls. PART ONE: YOUR COMPUTER It makes sense to start with securing your computer since that's the foundation of Gmail access. The first order of business is to check for updates to the computer's operating system (OS) – which for most users is either Microsoft Windows or Apple OS X. In Microsoft Windows, click Start > All Programs > and click on Windows Update. In the window that comes up, click the Check For Updates link (you'll need to be online to do this). Windows Update will find and automatically select the most important updates; all you have to do is click install and possibly restart when it's finished. In Mac OS X, click the Apple menu > Software Update. This will open the App Store and display a list of available updates; click Update All to begin the process. It's of vital importance to keep your operating system up-to-date; the OS controls all Internet communication on your computer. Any vulnerability there will affect all of your online interaction!
  • 3. 3 STEPS TO SECURE GMAIL Backupify, Inc. 3 Next let’s check if your web browser is up-to-date; this is almost as important as the OS since the browser is the one processing all the Internet traffic, Gmail included. Internet Explorer: patches for Internet Explorer will automatically be applied with Windows Update (see above). Firefox: open Firefox and click the Firefox button at the top. Mouse over Help and click About Firefox; it will check for updates and start the download. Click the Apply Update button when it shows up. Google Chrome: Click the wrench icon to the right of the address bar and then About Google Chrome; it will automatically check for and apply updates. Apple Safari: for OS X users, updates will be applied by using Software Update for the OS. For Windows users, launch Apple Software Update (Start > All Programs > and click on Apple Software Update) to begin the process. The last step to secure your computer is to make sure anti-virus software is installed such as Norton or McAfee. Microsoft Security Essentials is free and a solid alternative to paid solutions for Windows users if you don't already have anti-virus. Keep in mind this software is a last line of defense; it will deal with any malicious software that gets through your OS and browser. PART TWO: CHANGE GMAIL AND GOOGLE ACCOUNT SETTINGS You can setup two-step verification on your Google Account to go beyond simple password security. You'll have to enter not only a password but also a code sent to your phone by Google in order to access your account. This means someone trying to hack your Gmail account will need not only your password but also your phone to get in. It's a no-brainer to set this up. Google has a two-step verification walkthrough here. Another important setting pertaining to Gmail itself is the use of a secure or SSL connection. An SSL connection encrypts the data going out of and coming into
  • 4. 3 STEPS TO SECURE GMAIL Backupify, Inc. 4 your computer; this means the data is unreadable even if intercepted; it can only be decrypted by your computer and the server on the other end. Login to Gmail and click the gear icon on the right side of the screen; then click Settings. The fifth category down is Browser Connection; select Always Use HTTPS. Then scroll down and click the Save Changes button. PART THREE: GOOD PRACTICES TO STAY SAFE You can defeat all of the above security precautions if you get up and walk away from your computer without locking it or at the very least, signing out of Gmail. This is especially true of computers other than your own in public places, such as hotels. Tip: on public computers, make use of a web browser's privacy mode. Press Ctrl + Shift + P to enable privacy mode in Internet Explorer and Firefox; in Google Chrome, press Ctrl + Shift + N; in Apple Safari click the gear icon and then Private Browsing (or in Mac OS X, choose Safari > Private Browsing). The browser won't remember any history or passwords in private mode. Remember to close the browser though! The last area we’ll address concerns passwords. Even if you don't write them down it's still possible for someone to guess your password. The solution is changing your password often – and making it something hard to guess! Your pet's name is not acceptable. Ideally make the password a phrase instead of a single word; include lower and upper case letters, at least one number and a special symbol such as an exclamation point. “1 L0ve to Re@d!” is a good example. CONCLUSION The tips in this article aren't once-and-done tasks - it's necessary to rinse and repeat to keep your Gmail security at its best. Check for software updates on a
  • 5. 3 STEPS TO SECURE GMAIL Backupify, Inc. 5 regular basis, change your passwords, and please never get up from your computer without signing out of Gmail or locking your computer. Letting someone voluntarily or involuntarily have access to your email is equivalent to giving them a license to commit identity theft! ABOUT BACKUPIFY Backupify is the leading provider of backup and restore solutions for SaaS applications including Google Apps, Salesforce, Facebook, Twitter, and more. Backupify was founded in 2008 and is based in Cambridge, MA. Backupify has over 200,000 users trusting us with more than 500 million documents, two billion email messages and 350 terabytes of data. WHY BACKUP CLOUD DATA? Your data is one of the most critical assets of your business. Like any important asset, it should be insured. While most SaaS providers, including Google and Salesforce, offer state-of-the-art disaster recovery capabilities that protect you from some forms of data loss, you are still at risk for data loss due to user error, hacked accounts and third-party application bugs. To fully replicate your on- premise backup capabilities in the cloud, you need the ability to perform granular restores, and to retain the control that comes from having your own secure second copy of the data in your SaaS applications. FIND OUT MORE If you're interested in the peace of mind you get from an automated Google Apps or Salesforce backup solution, feel free to contact us directly at info@backupify.com.  Web http://www.backupify.com  Phone 1.800.571.4984  Twitter http://twitter.com/backupify
  • 6. 3 STEPS TO SECURE GMAIL Backupify, Inc. 6 Backupify logo is a registered trademark or registered trademarks of Backupify, Inc. All other names may be the trademarks or registered trademarks of their respective owners. © 2012 Backupify, Inc. Item: GAT-WP-EN-200110608