Skip to main content

Posts

Showing posts with the label 2SV

Keeping your Google Account accessible

In spite of the growing popularity of social media and messaging apps, Emails still retain their importance. We use it for all official and otherwise important and formal correspondences, all our important reports - medical, financial, professional get delivered to it, and if it is a Gmail address, then it also ties everything to its Google account, where you would typically have all your valuable documents stored and invaluable photos saved. Now imagine losing access to all of those, suddenly, over something you casually overlooked or were previously cavalier about. There are various ways one can lose access to their Google account. Some are more ubiquitous than others, so there is a very strong argument about better understanding what needs to be done to be able to keep your Google account accessible all the time. It is important to remember that this is NOT a blog on account recovery. There are several of them around (my favourite being this one ) and it is pointless to add one mor

What to expect from your Google Account Security

Google Account Security has been central to many of the things I have been doing of late so it was a no-brainer when it came to picking a topic to write an article for the Cyber-security awareness month. Knowledge about your Google Account’s security is important as it helps you to understand how it works and also for the fact that it is the user's responsibility to ensure the security of their Google accounts. Presently, Google offers four (4) levels of account security on their accounts and this article presents an overview of the details of those four levels and explains how you can best decide on the level of security you require for your account and ways to manage the various security options.  This understanding of the security levels is also very important from the account recovery perspective as the Google user-verification system looks to verify user ownership beyond all reasonable doubts using the most secure process based on the highest security level enabled on that acc