Archives - Google


Enable two-factor authentication on your Google Account

Do you use Gmail? If the answer is yes, then it is highly recommended to establish two-factor authentication. This additional layer of security ensures that a purloined password alone will not grant an intruder access to your account. You have the option to confirm every new login attempt via an SMS or, for a more […]

Delete old files in Drive to free up space for other Google services

Every Google service typically uses a fixed amount of storage shared across all platforms. That means if you have a lot of files on Google Drive, it’s taking up the same space on Google Docs and Gmail. While Gmail will automatically free up space for new emails if your storage is full, it won’t do […]

Avoid duplicating apps on your devices

So much information about our lives is stored in our devices that it can be easy to lose track of it all sometimes. This is especially true if you begin doubling up on apps that essentially do the same thing. If, for example, your phone already has a calendar app installed but you prefer Google […]

Set up two-step authentication on your Apple ID or Google Account

You probably have at least one device that runs either iOS or Android. In order to protect your data and identity, set up two-factor authentication so that every login attempt requires an additional credential on top of your username and password. This might be a text message code or an approval from another trusted device.

Use Google Password Manager to identify compromised passwords

If you allow Google Chrome to save your passwords, you can find a full list of them by going to passwords.google.com while signed into your account. At the top of this page is an option to “Go to Password Checkup.” This does a comprehensive scan of all your saved passwords and flags any that are […]

Use Google Analytics to track visitor locations

Your business website may be a convenient backdoor into your systems which hackers could exploit to gain access to sensitive information, or simply hijack your website and hold it to ransom. As hackers will often bounce through VPNs across the globe, you can use Google Analytics to monitor where traffic is coming from and flag […]