SlideShare a Scribd company logo
Gmail Security
Topics of Discussion:
• Gmail - Brief Information
• Why is Gmail Security Important?
• Security Features Provided By Gmail
• SecuringYour Gmail Account
• Interesting Facts & Cases
• How Can Quick Heal Help?
Gmail - Brief Information
• .
POLL 1
Why Is Gmail Security Important
• Your Gmail messages last for ever. So does the information inside
the Gmail message!
• Some sensitive data contained in Gmail Messages :
Banking Information
Account Numbers
Salary Slips
Personal Information
Photographs
Private Messages
Professional Information etc.
• Lastly For Google - "One Password,All Of
Google" i.e. same username password
combinations for Gmail,YouTube, Picasa,
Google+ and a plethora of other Google
Products.
• All the information on these platforms is at
risk with a hacked GmailAccount &Vice
Versa
Why Is Gmail Security Important?
Security Features
Provided By Gmail
Security Features Provided By Gmail
Attachment Scanner
• Gmail automatically scans every
attachment for viruses.
• If a virus is detected, the message is
rejected with a notification to the sender.
• Attachments with viruses cannot be
uploaded or downloaded in Gmail.
Security Features Provided By Gmail
Spam Filtering
• Text Filter: Filters messages containing
'Spammy Phrases' & 'Intentional
Misspellings'.
• Blacklists:Google maintains a list of
blacklisted email id's & their messages
invariably end up in the Spam folder of the
receivers.
• Client Filters:The spam filters use client
identity and history to block malicious e-
mails they send.
Security Features Provided By Gmail
HTTPS
• Gmail always uses an 'encrypted HTTPS
connection'
• This ensures, no one can intercept your
messages when you check or send an email.
POLL 2
SecuringYour Gmail
Account - A Step by
Step Guide
SecuringYour Gmail Account
Step I. Login to Gmail >> Go to Account
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step II. Click Get Started
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step III. Under Add Recovery Information add your phone number and alternate
email address.These will help Google reach you if any unusual activity is detected on
your account.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
Step IV.Click Done, and move to Check your recent activity section.
Here, you can check how many times your Gmail/Google account has been logged
into using browsers and apps.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepV. If everything looks good, move to the next check point called Check your
Account Permissions.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepVI. Once you are done with the Security Checkup, click Continue to account
settings.
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
SecuringYour Gmail Account
StepVII. HereYou will see an option for 2-step verification
Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
Other StepsTo Boost Gmail Security
• Set Strong Passwords - A CombinationOf Uppercase & Lowercase letters, numbers &
Symbols. Avoid - DOB's, Name's, Spouse's names etc.
• Set Unique Passwords for every account -This ensures safety in case one of the accounts is
compromised
• Avoid Setting Auto Responders - They respond indiscriminately to forged and legitimate
email & when they reply to spam emails, they themselves become a source of spam.
• Avoid setting vacationAuto Responders with location Information.
• Always Sign Out once you are done.
POLL 3
Interesting Facts &
Cases
Interesting Fact
• Google Drive Offered 2GB Of Free Storage
For DoingA Quick Security Checkup Until
17th February 2015
• This clearly shows the importance Google
gives to the user Account Security.
Analysis Of Leaked Gmail Passwords -
Sep 2014
POLL 4
How Can Quick Heal
Help with Email
Security
How Can Quick Heal Help withYour
Email Security
Quick Heal Products give cloud-based email security that blocks spam, phishing, and
infected emails from reaching your Inbox.
• AntiSpam blocks spam, phishing, junk, and other unwanted mails from reaching your Inbox.
• Quick Heal Products use live, cloud-based protection to check for suspicious files restricting
malware before it reaches your inbox
How Can Quick Heal Help withYour
Email Security
Thank YouCorporateCommunications@quickheal.co.in
Follow us on:
Facebook -www.facebook.com/quickhealav
Twitter -www.twitter.com/quickheal
YouTube - www.youtube.com/quickheal
SlideShare - http://www.slideshare.net/QuickHealPPTs
Website -www.quickheal.com
Official Blog -www.blogs.quickheal.com
References:
• http://en.wikipedia.org/wiki/Gmail
• http://www.visualistan.com/2014/06/things-you-should-know-about-gmail.html
• http://www.upgrademag.com/web/infographic-things-know-gmail/
• http://money.cnn.com/2014/04/01/technology/gmail/
• http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/
• https://support.google.com/mail/answer/25760?hl=en
• https://support.google.com/mail/checklist/2986618?hl=en
• https://blog.lastpass.com/2014/09/the-scary-truth-about-your-passwords-an-analysis-of-the-gmail-leak.html/

More Related Content

What's hot

Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
Salman Memon
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcitmmubashirkhan
 
Introduction to Gmail
Introduction to GmailIntroduction to Gmail
Introduction to Gmail
Baldwin Public Library
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Spam
SpamSpam
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
anilinvns
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Krishna Srikanth Manda
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
KnowBe4
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
Dinesh582831
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
Shubh Thakkar
 
User Identity and Authentication
User Identity and AuthenticationUser Identity and Authentication
User Identity and Authentication
Amazon Web Services
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
Bill Gardner
 

What's hot (20)

Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Two factor authentication presentation mcit
Two factor authentication presentation mcitTwo factor authentication presentation mcit
Two factor authentication presentation mcit
 
Introduction to Gmail
Introduction to GmailIntroduction to Gmail
Introduction to Gmail
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Spam
SpamSpam
Spam
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
User Identity and Authentication
User Identity and AuthenticationUser Identity and Authentication
User Identity and Authentication
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 

Similar to Gmail Security

7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
Mumara Campaigns
 
สมัครgmail.pdf
สมัครgmail.pdfสมัครgmail.pdf
สมัครgmail.pdf
Muhammad Waqas
 
Understanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy PrimerUnderstanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy Primer
Hayden Sin
 
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified AccountsBuy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
Johnathan Johnson
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
Mike Felch
 
Secrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail InboxSecrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail Inbox
Affiliate Summit
 
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
e-Definers Technology
 
G-mail Class Presentation
G-mail Class PresentationG-mail Class Presentation
G-mail Class PresentationRichard Smith
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
Temok IT Services
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
Beau Bullock
 
Email and web security
Email and web securityEmail and web security
Email and web securityshahhardik27
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
Gabor Szathmari
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
Ernest Staats
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web Presence
Rich Benjamin
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Cracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance ReportingCracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance Reporting
Marketo
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1Adam Ripsam
 

Similar to Gmail Security (20)

7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx7 Email Security Best Practices You Need to Follow in 2023.pptx
7 Email Security Best Practices You Need to Follow in 2023.pptx
 
สมัครgmail.pdf
สมัครgmail.pdfสมัครgmail.pdf
สมัครgmail.pdf
 
Understanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy PrimerUnderstanding Gmail's Terms of Service - Policy Primer
Understanding Gmail's Terms of Service - Policy Primer
 
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified AccountsBuy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
Buy Old Gmail Accounts - Old Or New, 100% PVA Verified Accounts
 
Red Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite PerimeterRed Team Tactics for Cracking the GSuite Perimeter
Red Team Tactics for Cracking the GSuite Perimeter
 
Secrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail InboxSecrets to Conquering the Gmail Inbox
Secrets to Conquering the Gmail Inbox
 
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
GOOGLE ADVANCED  PROTECTION PROGRAM.pptxGOOGLE ADVANCED  PROTECTION PROGRAM.pptx
GOOGLE ADVANCED PROTECTION PROGRAM.pptx
 
G-mail Class Presentation
G-mail Class PresentationG-mail Class Presentation
G-mail Class Presentation
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?OK Google, How Do I Red Team GSuite?
OK Google, How Do I Red Team GSuite?
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web Presence
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Cracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance ReportingCracking the Inbox Code: Bounce and Performance Reporting
Cracking the Inbox Code: Bounce and Performance Reporting
 
Internet and Email 101 v1
Internet and Email 101 v1Internet and Email 101 v1
Internet and Email 101 v1
 

More from Quick Heal Technologies Ltd.

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
Quick Heal Technologies Ltd.
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
Quick Heal Technologies Ltd.
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
Quick Heal Technologies Ltd.
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
Quick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Quick Heal Technologies Ltd.
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
Quick Heal Technologies Ltd.
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
Quick Heal Technologies Ltd.
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
Quick Heal Technologies Ltd.
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
Quick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Quick Heal Technologies Ltd.
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
Quick Heal Technologies Ltd.
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
Quick Heal Technologies Ltd.
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
Quick Heal Technologies Ltd.
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
Quick Heal Technologies Ltd.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
Quick Heal Technologies Ltd.
 

More from Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Recently uploaded

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
Google
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
Roshan Dwivedi
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Crescat
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
Paco van Beckhoven
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
timtebeek1
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 

Recently uploaded (20)

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
AI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website CreatorAI Genie Review: World’s First Open AI WordPress Website Creator
AI Genie Review: World’s First Open AI WordPress Website Creator
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Launch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in MinutesLaunch Your Streaming Platforms in Minutes
Launch Your Streaming Platforms in Minutes
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
Introducing Crescat - Event Management Software for Venues, Festivals and Eve...
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024Cracking the code review at SpringIO 2024
Cracking the code review at SpringIO 2024
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdfAutomated software refactoring with OpenRewrite and Generative AI.pptx.pdf
Automated software refactoring with OpenRewrite and Generative AI.pptx.pdf
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 

Gmail Security

  • 2. Topics of Discussion: • Gmail - Brief Information • Why is Gmail Security Important? • Security Features Provided By Gmail • SecuringYour Gmail Account • Interesting Facts & Cases • How Can Quick Heal Help?
  • 3. Gmail - Brief Information • .
  • 5. Why Is Gmail Security Important • Your Gmail messages last for ever. So does the information inside the Gmail message! • Some sensitive data contained in Gmail Messages : Banking Information Account Numbers Salary Slips Personal Information Photographs Private Messages Professional Information etc.
  • 6. • Lastly For Google - "One Password,All Of Google" i.e. same username password combinations for Gmail,YouTube, Picasa, Google+ and a plethora of other Google Products. • All the information on these platforms is at risk with a hacked GmailAccount &Vice Versa Why Is Gmail Security Important?
  • 8. Security Features Provided By Gmail Attachment Scanner • Gmail automatically scans every attachment for viruses. • If a virus is detected, the message is rejected with a notification to the sender. • Attachments with viruses cannot be uploaded or downloaded in Gmail.
  • 9. Security Features Provided By Gmail Spam Filtering • Text Filter: Filters messages containing 'Spammy Phrases' & 'Intentional Misspellings'. • Blacklists:Google maintains a list of blacklisted email id's & their messages invariably end up in the Spam folder of the receivers. • Client Filters:The spam filters use client identity and history to block malicious e- mails they send.
  • 10. Security Features Provided By Gmail HTTPS • Gmail always uses an 'encrypted HTTPS connection' • This ensures, no one can intercept your messages when you check or send an email.
  • 12. SecuringYour Gmail Account - A Step by Step Guide
  • 13. SecuringYour Gmail Account Step I. Login to Gmail >> Go to Account Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 14. SecuringYour Gmail Account Step II. Click Get Started Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 15. SecuringYour Gmail Account Step III. Under Add Recovery Information add your phone number and alternate email address.These will help Google reach you if any unusual activity is detected on your account. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 16. SecuringYour Gmail Account Step IV.Click Done, and move to Check your recent activity section. Here, you can check how many times your Gmail/Google account has been logged into using browsers and apps. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 17. SecuringYour Gmail Account StepV. If everything looks good, move to the next check point called Check your Account Permissions. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 18. SecuringYour Gmail Account StepVI. Once you are done with the Security Checkup, click Continue to account settings. Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 19. SecuringYour Gmail Account StepVII. HereYou will see an option for 2-step verification Refer http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ for more details
  • 20. Other StepsTo Boost Gmail Security • Set Strong Passwords - A CombinationOf Uppercase & Lowercase letters, numbers & Symbols. Avoid - DOB's, Name's, Spouse's names etc. • Set Unique Passwords for every account -This ensures safety in case one of the accounts is compromised • Avoid Setting Auto Responders - They respond indiscriminately to forged and legitimate email & when they reply to spam emails, they themselves become a source of spam. • Avoid setting vacationAuto Responders with location Information. • Always Sign Out once you are done.
  • 23. Interesting Fact • Google Drive Offered 2GB Of Free Storage For DoingA Quick Security Checkup Until 17th February 2015 • This clearly shows the importance Google gives to the user Account Security.
  • 24. Analysis Of Leaked Gmail Passwords - Sep 2014
  • 26. How Can Quick Heal Help with Email Security
  • 27. How Can Quick Heal Help withYour Email Security Quick Heal Products give cloud-based email security that blocks spam, phishing, and infected emails from reaching your Inbox. • AntiSpam blocks spam, phishing, junk, and other unwanted mails from reaching your Inbox. • Quick Heal Products use live, cloud-based protection to check for suspicious files restricting malware before it reaches your inbox
  • 28. How Can Quick Heal Help withYour Email Security
  • 29. Thank YouCorporateCommunications@quickheal.co.in Follow us on: Facebook -www.facebook.com/quickhealav Twitter -www.twitter.com/quickheal YouTube - www.youtube.com/quickheal SlideShare - http://www.slideshare.net/QuickHealPPTs Website -www.quickheal.com Official Blog -www.blogs.quickheal.com
  • 30. References: • http://en.wikipedia.org/wiki/Gmail • http://www.visualistan.com/2014/06/things-you-should-know-about-gmail.html • http://www.upgrademag.com/web/infographic-things-know-gmail/ • http://money.cnn.com/2014/04/01/technology/gmail/ • http://blogs.quickheal.com/wp/6-easy-steps-to-tighten-your-gmail-security/ • https://support.google.com/mail/answer/25760?hl=en • https://support.google.com/mail/checklist/2986618?hl=en • https://blog.lastpass.com/2014/09/the-scary-truth-about-your-passwords-an-analysis-of-the-gmail-leak.html/