Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

How to protect your Gmail account

Written by  May 11, 2020

Technology is constantly changing and at a pace which is hard to keep up with, but 'safety first' always applies.

If you are crypto trading it is very important to protect your online accounts, your crypto account details must be secured at all costs.

The internet is getting faster, virtual reality is becoming more realistic, and AI gets more impressive by the day.

Despite all that, the most common password worldwide in 2019 was still “123456”. Followed, in close second, by its much more secure cousin: “123456789”.

Advertisement

It is clear that there is a contrast between the cutting edge and the average user. And that contrast is usually at the core of many of the cybersecurity problems that plague personal users today.

The present situation

How important is the crypto data contained in your notebook, and how secure is said notebook? There should be a direct relation between the two, and you should know the answer to both. The problem is that it can be easy to underestimate how valuable the information in a device is. Until it leaks or gets breached, of course.

If your laptop is logged into your Gmail account, for example, then suddenly anyone with access can collect every single email conversation you ever had, including details on who are your clients, suppliers, and everything they’ve ever said to you. Such access would also allow a hacker to send out a massive wave of emails saying… anything they want, really. It hardly matters what is said; such a breach would damage customer trust in your company forever.

That type of attack is not very common. But here’s a type of attack that is. Say the aforementioned Gmail account is also the same account that manages the company’s Google Drive, where all your most important files are. In such a scenario, all a hacker with access has to do is download it all, wipe your Google Drive, and then ask for ransom in exchange for the files being returned safely.

This is a very common type of attack and one that Google works tirelessly to prevent. But it can be hard to prevent it if a company does not have the right security structures in place. The case listed above involves just one machine being compromised: your personal notebook. But is that the only device connected to your work Gmail account? And is that the only account that could potentially delete your entire Google Drive, or whatever cloud storage service you use?

Advertisement

Norton Security Deluxe 2019 | 5 Devices + Utilities| 1 Year | Antivirus Included | PC/Mac/iOS/Android | Activation Code by Post
amazon uk

How to be safer

To protect your Gmail account; ideally, there should be only one account with the authority to delete your entire Google Drive, and that account should be used solely for the purpose of managing cloud storage and be locked behind all sorts of security measures. That’s way, there is only one door hackers can get through to do a ransomware attack, and said door is the thickest door in the metaphorical building.

Do you find this article useful? Comment below or follow us on Facebook, Twitter or LinkedIn.

Peter Flynn

Senior Editor and self confessed Crypto addict, bringing a variety of Crypto tech news, help and advice in the UK. I have worked in various fields throughout my career such as a Systems Administrator, Cyber Security Consultant and other technical related roles, these days I concentrate on Cryptocurrency journalism and technical writing.

Leave a comment

Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.

Follow Us

Advertisement

Help and Advice

May 06, 2020

Beginners Guide To Cryptocurrency

Cryptocurrency has been around since 2009 and has grown in popularity ever since. But if you’re a beginner in the cryp...

Feb 10, 2020

Tips To Trade The Volatile Crypto Market

The expected economic impact of the coronavirus has resulted in crashing stock markets across all the globe. ...

May 08, 2020

What is Cryptojacking?

'Cryptojacking' is a term used to describe the action of secretly using a computer to mine cryptocurrency for profit. ...

May 26, 2020

Ways to invest in the cryptocurrency market

Bitcoins huge price movement back in 2017 attracted many investors who wanted to profit from the emergence of this new d...

May 11, 2020

What is an ICO?

An ICO stands for Initial Coin Offering, it is a method for teams to raise funds for a project in the cryptocurrency spa...

Jun 24, 2020

The difference between Bitcoin, Altcoins and Tokens

The cryptocurrency market is well established, but then there are new people discovering the benefits of crypto trading ...

Feb 20, 2020

How VPN Services Protect Your Data

Wherever you are, a virtual private network is still one of the best ways to secure your crypto data on the internet. ...

Jan 31, 2020

Tips on keep your mobile banking apps secure

If you are buying and selling cryptocurrency and need to fund your investments or withdraw your money, it always pays to...

Jan 13, 2020

Be wary of shoulder surfing

When you are trading in the office this is rarely a problem as you know your colleagues and you are in an enclosed envir...

May 11, 2020

How to protect your Gmail account

Technology is constantly changing and at a pace which is hard to keep up with, but 'safety first' always applies. ...

Apr 06, 2020

Every new crypto computer needs protecting

All those crypto files you’ve saved through the years that you can’t remember what they are? Goodbye, it wasn’t me...

Jan 08, 2020

What you need to know about filing Crypto taxes in the UK

For some time, Governments across the world have been cracking down on crypto taxes.

Feb 07, 2020

Is 2 Factor Authentication Enough?

The technology and security controls in every example is different and therefore, the time, effort, and cost required to...

Feb 21, 2020

Proton Mail: The Best Secure email Provider there is

Proton Mail offers a comprehensive level of security, while also locating its data centres ‘underneath 1000 meters of ...

Feb 17, 2020

What is a Trojan?

As the name suggests, Backdoor Trojans are designed to grant an external user full control over a system by creating a b...

Jan 15, 2020

How to secure your router from Cyber Attacks

Hackers nowadays are seen using routers as botnets to launch cyber attacks on large companies and organisations. ...