Securing Your Google Account: The Unofficial Guide

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use,security isn’t ignored either.

Unfortunately, security is precisely what is often ignored, mainly due to ignorance as to why and how to secure their account. Here, we will cover both why a Google account absolutely must be locked down, and how to go about doing it.

What Makes a Google Account So Valuable

There is a huge discrepancy between the impression of what the Internet itself is for, and what it was actually created to do. While a great amount of the Internet is utilized as a means to store personal and private information, it was actually intended to share information as effectively as possible. The word Internet itself reflects that, derived from inter (reciprocal or shared) and network (a system of connected things).

From the very start, the Internet was meant to be an information dispersal tool, enabling anyone to access the knowledge they wanted. Back in 1962, MIT’s J.C.R. Licklider described a system he called the“Galactic Network” in a series of memos. The Galactic Network was meant to connect computers all around the world so that data and programs could be shared. Sir Tim Berners-Lee, the man credited with inventing the World Wide Web, did so based on the ideals of access and openness. As he put it:

“Had the technology been proprietary, and in my total control, it would probably not have taken off. You can’t propose that something be a universal space and at the same time keep control of it.”

This viewpoint informed the Internet as it largely exists today: a space where things can be shared, unfettered by any central point of control. This is the framework that the ideals of net neutrality and group participation flourish in, censorship stomped down through accessibility. It’s almost funny that we try to keep anything on the Internet a secret anymore, looking back at its original purpose.

Yet, as the Internet was leveraged for additional purposes, there was an increased need for privacy and security. Many communications shared online contain confidential information that needs to be shared exclusively with certain users. As a result, a new online environment emerged, where security measures restricted access to information to only those with the right credentials. This new approach has proved beneficial for businesses and individuals alike and is why Google has grown to offer what it does today.

Google’s Assorted Services

While Google originally started as a dissertation project by two PhD students at Stamford, its uses have expanded greatly in the years since. G Suite applications, like Google Drive, Google Docs, and others have assisted businesses greatly, while many private users have leveraged services like Google Maps and Google Drive for their own ends.

Perhaps most of all, users of all kinds have opened Gmail accounts, and have used these accounts to sign up for other assorted web services… and this is the where the potential problem lies.

How much do you rely on Google, in terms of accessing your online accounts? How much impact would the compromise of your Google account have?

It May Be More Than You’d First Think

Let’s look at the tendency to use a Gmail address whenever an email is required, or to save a password for easy access,or even to link a Google account to another profile. This all makes Google the most convenient option–if all you need is an email to create a profile, why not just use the one that you use for everything else?

Really, when all is said and done, Google is the choice that makes the most sense. Google offers reasonable security, and the other capabilities it offers deliver some compelling reasons to use it a soften as possible. However, there is a consideration that many overlook, to the potential detriment of the security of all of their accounts.

Setting up an account through Google means that account is only as secure as your Google account is.

Or in other words, if someone were to access your Google account, they have everything they need to access every account that you connected to Google in some way, shape, or form. This may mean more to you than you’d realize.

A Brief Demonstration

If you happen to be reading this on a desktop,go to your Google account by clicking here. Under Sign-in & security, click into Apps with account access. This will show you a list of all the applications with access to your Google account, along with a list of the websites that Google Smart Lock has your credentials to.

How long is your list? Does it happen to feature your bank?

If so, someone who gains access to your account could easily commit financial fraud. They could also use their access to your email to tell your bank that “you’ve” forgotten your password, resetting it and locking you out.

The Quandary

Unfortunately, the usefulness that Google delivers is too great to ignore as well, to the point that it is almost irresponsible to pass it up. This leaves us at an impasse of sorts–do we embrace convenience at the cost of security, or improve our security while sacrificing convenience?

The good news is, you don’t have to choose, as long as you have properly secured your Google account.

A daunting task, yes, but only because we have grown accustomed to Google providing one-click solutions. While there is no magic option that will keep you completely safe, securing a Google account is possible if the right precautions are taken.

Protecting Your Google Account

Again, these aren’t magic options, which means that that these aren’t solutions that will work indefinitely. Rather, they will require repeated activities over time. What follows are the steps you need to follow in order to protect your Google account, and by extension, your data.

Passwords and Account Security – Of course, this goes for all of your accounts, but because your Google account has so much tantalizing info in it for a hacker to leverage to their advantage you need to be extra careful in locking it down. Therefore, you need to ensure that access to it is sufficiently protected by a password in keeping with best practices, as well as the access point used to log into your account.

A good rule of thumb is to avoid using devices that are open to the public in order to access your accounts. This is because a cyber criminal may be able to access your account after you have finished your work, and the fact that these devices are petri dishes for cyber attacks doesn’t help either. Public Wi-Fi signals should be avoided for similar reasons. All the convenience in the world isn’t worth a security breach.

Two-Factor Authentication (2FA) – In addition to being smarter about how you access your Google account, you should establish additional requirements to make it more challenging to do so. Two-factor authentication can be a highly effective way to prevent unwanted access to an account, as long as it’s approached correctly.

The crux of the matter is this: not all two-factor is the same. If given the choice between a text-based 2FA solution or a mobile application like Google Authenticator, you should utilize the app. It will be the more secure option.

Furthermore, your Google account will give you access to a list of authentication codes that each have a one-time use. These can be used if you don’t happen to have your mobile device handy. Furthermore, these can be reset whenever you need to, so if you happen to lose the list, you don’t have to worry.

Log in to your Google account to set up these features and the others that are offered.

With the amount that the average Google account is linked to, it is paramount that its security is preserved. WheelHouse IT can help you preserve not only the sanctity of your Google account, but your entire IT infrastructure. Give us a call at (877) 771-2384 to learn more.

Google Drive Offers More Shortcuts than a GPS

Google Drive Offers More Shortcuts than a GPS

Google has an assortment of solutions available on the Internet. Chances are, your business uses some of them.

However, they probably aren’t using them as efficiently as they could. Google’s online solutions have a huge assortment of shortcuts available for each. Today, we’ll go over a few of them.

Google Drive

  • To select (or deselect) items,press x.
  • To select all visible items, press Shift + a. To clear your selection of visible items, press Shift + n.
  • You can open an item you have selected by pressing Enter or o, or rename it by pressing n.
  • To move items, you have selected to a new folder, press z, and to “star” / “un-star” them, press s.
  • You can also create new items with a shortcut:
    • Folder – Shift + f
    • Document – Shift + t
    • Spreadsheet – Shift + s
    • Presentation – Shift + p

Google Docs

  • To insert or edit a link, press Ctrl + k, and to open a link, press Alt + Enter.
  • To type with a strike through in your text, type Alt + Shift + 5.
  • To format your text as a superscript, press Ctrl +.
  • To format as a subscript, press Ctrl –.
  • You can insert a footnote by pressing Ctrl + Alt + f.

Google Sheets

  • To select all the contents in one column, press Ctrl + Space. For one row, press Shift + Space.
  • Applying an outer border to your selected cells is simple: just press either Alt + Shift + 7, or Ctrl +Shift + 7.
  • To clear the formatting within a selection, press Ctrl + \.
  • Flipping between sheets can be done by pressing Ctrl + Page Up (for previous sheet)/Page Down (for next sheet).
  • To see a list of formulas, press Ctrl + ~.

Google Slides

  • To duplicate a slide or object,press Ctrl + d.
  • You can move from slide-to-slide in the filmstrip using either the Page Up/Down buttons or the Up/Down arrow keys.
  • Moving over to the filmstrip is as easy as pressing Ctrl + Alt + Shift + f, while moving back to the canvas can be accomplished using Ctrl + Alt + Shift + c.
  • Rotating objects can be done by one degree if you press Alt + Shift +Left/Right Arrow, and by fifteen degrees by pressing Alt + Left/Right Arrow.

Using these shortcuts should help you to be more efficient. Now, don’t worry if you can’t quite remember all of them, as well as the many not mentioned here. There are really just one that you have to remember. This is because Google provides a list of all the available shortcuts with each app.

  • In Drive, Docs, Sheets, and Slides, press Ctrl + / to pull up the shortcut cheat sheet for the app you’re using.

What are your favorite shortcuts for Google applications? Tell us in the comments!

Google Maps Now Has Commuter-Friendly Features

Google Maps Now Has Commuter-Friendly Features

Maps are one of those very basic technologies that are always improving, starting as lines scratched into the ground and now living in our phones and giving us exponentially larger amounts of data.

One of the first examples you may think of is Google Maps, which just got a few impressive updates that make the service even cooler.

Getting You There On Time

Google Maps has received quite the boost from some handy new features delivered to both the Android and iPhone versions of the app. First is the “Commute” tab, which delivers information pertinent to one’s route, and will even update the user to disruptions along the way.

As it does so, Google Maps also now delivers alternative routes as possible. As a result, a user can potentially avoid those metaphorical bumps in the road, or at least be prepared for them when they come.

For example, let’s assume that you have two potential options for your route – one going through a more urban area, and the other skirting around the outside. Google Maps can tell you which option is more efficient based on data – perhaps city traffic is gridlocked, or there was an accident on the roads going around that has slowed traffic to a crawl.

Furthermore, for proponents of public transportation, Google has even included the occupancy of trains and buses in some areas, as well as real-time updates as to where it is along its route. Want to grab a quick breakfast burrito before your train arrives? Google Maps now lets you know if you have the time.

Music Makes For A Pleasant Commute

Google Maps now also enables in-app support for music services. Instead of having to switch back and forth between apps, Google Maps allows a user to control what they are listening to on Spotify, Google Play Music, and Apple Music.

So, What Do You Think?

Are these welcome additions to Google Maps? What other features would you like to see from navigation apps like this?

Let us know in the comments, and while you’re at it, take a second to subscribe to our blog!

How to Use Google Calendar for Business

How to Use Google Calendar for Business

Google Calendar is a great free tool to keep up with both your work and personal responsibilities. It’s easy to use and can be synced across all your devices. Here are a few tips for being more efficient with Google Calendar.

Change Your Timezone

If you are working remotely with a company in another time zone, you can easily change the time zone in the settings. This way, you can easily stay on track of events and deadlines in other countries. You can add multiple time zones if needed. Alternatively, you can click on the Show World Clock option to display different time zones on your calendar.

Get Notifications

In the event notifications settings, you can choose which notifications to get about events, canceled events, event changes, and so on. Never miss an important meeting again.

Create an Event Quickly

You can add an event to Google Calendar without even opening it. Just search “add event” or “make an appointment” in your browser bar or on Google.com, and type in the day and time. Google will automatically give you the option of adding an event to your calendar. You can also use Google Assistant on your smartphone for this by using Google Voice commands.

Browse Interesting Calendars

In the Add Calendar option in your settings, you can click on Browse Calendars of Interest in order to add new event reminders to your calendar. You can choose calendars of different religions to be reminded of religious holidays. There are also all sorts of sports calendars if you are a fan of specific sports. You can show phases of the moon as well. Of course, you can simply add a co-worker’s or employer’s calendar as well to stay in touch with work responsibilities.

For more IT help and computer tips, contact us today. 

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

Nigelthorn’s Method of Attack

When scrolling on Facebook, a user may see what appears to be a link to a YouTube video, but is actually a fake. This fraudulent video will then inform the user that in order for it to be played, an extension from the Chrome Web Store, called “Nigelify,” has to be installed. In reality, installing the extension allows the malware into the user’s system.

In order to fool its way past the Chrome Web Store defenses, Nigelthorn’s code is implanted into an extension that has already passed the Web Store’s checks. The first extension to be infected was one called “Nigelify,” which would replace all the pictures on the page a user was viewing with images of Nigel Thornberry, a late 1990’s/early 2000’s cartoon character who has found new life as a meme.

Once Nigelthorn is installed, it can have various effects on the infected system. For instance, not only will this attack vector steal the data that is available through Facebook, it will also share itself via Facebook Messenger, or by tagging the original victim’s friends. This makes it very effective at spreading from victim to victim, as all it takes it to infect the next person in line is for them to install the infected extension as well.

Nigelthorn has also been found to use other common tools that are found in malware in order to accomplish the goal of its developer, including crypto-mining and YouTube manipulation for financial gain.

Getting Rid of Nigelthorn

(and Avoiding It in the First Place)

What’s worse is that once Nigelthorn has been installed, it is notoriously hard to get rid of.

If you have inadvertently installed Nigelthorn, it will automatically close the extensions panel, preventing you from uninstalling it. This means that removing it will likely require you to uninstall Chrome. If you are unlucky enough to be infected, you should change your Google and Facebook credentials in case they were stolen by the malware.

As for avoiding Nigelthorn, the surest is to not click on the link. As long as the user in question knows not to click on fishy links or install additional extensions willy-nilly, using Chrome is still workably safe.

For more information about potential threats to your business’ cyber security, and how to stop them, keep reading out blogs, and don’t hesitate to call us at (877) 771-2384 for more help.

Contact Us Today and Check Out Our Blog!