Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

How to protect your Gmail account

Written by  Jul 17, 2020

Technology is constantly changing and at a pace which is hard to keep up with, but 'safety first' always applies.

If you are crypto trading it is very important to protect your online accounts, your crypto account details must be secured at all costs.

The internet is getting faster, virtual reality is becoming more realistic, and AI gets more impressive by the day.

Despite all that, the most common password worldwide in 2019 was still “123456”. Followed, in close second, by its much more secure cousin: “123456789”.

It is clear that there is a contrast between the cutting edge and the average user. And that contrast is usually at the core of many of the cybersecurity problems that plague personal users today.

The present situation

How important is the crypto data contained in your notebook, and how secure is said notebook? There should be a direct relation between the two, and you should know the answer to both. The problem is that it can be easy to underestimate how valuable the information in a device is. Until it leaks or gets breached, of course.

If your laptop is logged into your Gmail account, for example, then suddenly anyone with access can collect every single email conversation you ever had, including details on who are your clients, suppliers, and everything they’ve ever said to you. Such access would also allow a hacker to send out a massive wave of emails saying… anything they want, really. It hardly matters what is said; such a breach would damage customer trust in your company forever.

That type of attack is not very common. But here’s a type of attack that is. Say the aforementioned Gmail account is also the same account that manages the company’s Google Drive, where all your most important files are. In such a scenario, all a hacker with access has to do is download it all, wipe your Google Drive, and then ask for ransom in exchange for the files being returned safely.

This is a very common type of attack and one that Google works tirelessly to prevent. But it can be hard to prevent it if a company does not have the right security structures in place. The case listed above involves just one machine being compromised: your personal notebook. But is that the only device connected to your work Gmail account? And is that the only account that could potentially delete your entire Google Drive, or whatever cloud storage service you use?

Advertisement

Norton Security Deluxe 2019 | 5 Devices + Utilities| 1 Year | Antivirus Included | PC/Mac/iOS/Android | Activation Code by Post
amazon uk

How to be safer

To protect your Gmail account; ideally, there should be only one account with the authority to delete your entire Google Drive, and that account should be used solely for the purpose of managing cloud storage and be locked behind all sorts of security measures. That’s way, there is only one door hackers can get through to do a ransomware attack, and said door is the thickest door in the metaphorical building.


Do you find this article useful? Comment below or follow us on Facebook, Twitter or LinkedIn.

Peter Flynn

Creator and director of IT Security Centre UK.

I have worked in the IT industry for many years and developed my IT security skills in particular. As this area has always been of interest to me and is more important now than ever.

Contributors

We would like to invite IT Security Professionals from the UK to join our other contributors in providing high quality articles for our website.

To enhance IT Security Centres credentials and to offer an opportunity for other IT Professionals and IT Companies to share their work, information and ideas.

We are always happy to hear from other IT Security Professionals and look forward to your incite. please contact us for more information.

Popular News

Jun 13, 2020 IT Security News

Microsoft announces major issue in Windows 10 June 2020 updates

On 9th June, 2020, Microsoft released cumulative updates for supported versions of Windows 10 including version 2004, ve...

Jun 12, 2020 Cyber Security

NHS email service fooled users in phishing attack

NHS Digital is contacting users of its NHSmail email system after a small number of mailboxes were compromised in a gene...

Jun 12, 2020 IT Security News

100,000 cheap wireless cameras sold in the UK are vulnerable to hacking

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-bas...

Jul 23, 2020 Cyber Security

Many cyber attacks on UK sports industry says report

At large percentage of sporting institutions, organisations and teams in the UK have suffered a security incident in the...

Jun 25, 2020 IT Security News

NCSC catch a million phish

The National Cyber Security Centre has received the millionth submission to its Suspicious Email Reporting Service. ...

Jun 11, 2020 IT Security News

UK government still can’t decide how NHS contact tracing app should work

A new report today says that the UK government still hasn’t decided exactly how its NHS contact tracing app should wor...

Jun 10, 2020 IT Security News

Is your boss spying on you whilst you are homeworking?

The recent worldwide move to working from home has caused concern amongst employers.

Jun 27, 2020 IT Security News

Apple devices to get encrypted DNS

Apple this year will boldly go where its peers have gone before by implementing support for encrypted DNS in iOS and mac...

Jun 12, 2020 Cyber Security

Cybersecurity in the shortsighted gig economy

The ‘gig’ economy encompasses the increasing economic trend for professionals to take on a series of temporary work ...

Jun 16, 2020 Internet of Things

Ripple20 Bug Exposes Millions of IoT Devices

Exactly how many of the devices that include Ripple20 bugs are directly hackable via the internet remains far from clear...

Jun 11, 2020 Cyber Security

UK government to fund nine cyber security projects

The government is to invest £10m through March 2024 from various sources to fund nine academic cyber security projects ...

Jul 03, 2020 IT Security News

Increasing number of UK business PCs are vulnerable

A rising number of business PCs are at risk of malware infections, according to a new report from cybersecurity firm Ava...

Jun 12, 2020 IT Security News

Good reasons to use a proxy server

A proxy server – is a computer on the internet which acts as a middle-man between your computer and the website or ser...

Jun 12, 2020 IT Security News

Apple hardens security in macOS Catalina

Apple added new security-related features to iOS 13, and the company is not missing out on the opportunity to do the sam...

Jul 21, 2020 IT Security News

Businesses underestimate disruptive auto bot traffic

Business leaders say about 15% of their web application resources are taken up in dealing with the impact of automated b...

Jul 21, 2020 Cyber Security

UK number two country for targeted cyberattacks

The UK is the second most frequent target of “serious” cyberattacks, according to a new report from cybersecurity fi...

Advertisement
Symantec Home 120x60

Advertisement