Blog

Tip of the Week: Keep Your Gmail Messages Private

Tip of the Week: Keep Your Gmail Messages Private

Gmail has proven to be as secure as most other email platforms, but email is email and there are times when you send an email that isn’t opened promptly and you’d rather not have the information in that message get sent around or archived where you can’t control it. Now Gmail has added a feature that allows users to send messages that will delete themselves in a predetermined time frame, and work to keep the contents of those messages from being shared. Let’s take a look at them today.

Introducing Confidential Mode in Gmail

We’re all familiar with the secret agent that has a mission briefing that will self-destruct when it finishes. Made popular recently by the Mission Impossible franchise of movies, Gmail now gives users the ability to essentially do this. Users that don’t want messages to disintegrate over time can also send a passcode via text message that the recipient must enter to read the contents of the email. Pretty useful stuff.

Using Gmail’s Confidential Mode

Once you have the Compose window up, you will want to click on the little icon of the padlock and clock next to the Send button. This will toggle confidential mode on/off. Clicking on it will bring up a compose window in Confidential mode.

From here you can set the message’s expiration date if you so choose. It ranges from a day to five years, and you can select to provide a passcode for further security. If you do select to have a passcode, you will then be prompted to enter the phone numbers for both your phone and the recipient.

On mobile, Gmail offers additional confidentiality, using a similar process. To compose a confidential email, open the three-dot menu and select Confidential mode, and then select the preferences you’d like for that particular message. 

Obviously, this doesn’t guarantee security, but it will go above and beyond just sending a standard email. 

If you would like more tips and tricks, subscribe to our blog and check back to our site regularly.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Out of all the email messages you get throughout the workday, how many of them are spam messages or malicious emails from hackers trying to get at your credentials? You don’t need us to tell you that spam and phishing emails are a serious problem, bu...
While the right IT solutions can be a major benefit to your business and its processes, this will only be the case if your team members are trained to use them correctly. Let’s go over some of the training that you need to prioritize in order to ensu...
Cybersecurity is a massively important consideration for today’s businesses, and as a result, managing it is often given a considerable amount of time. However, recent developments suggest that this time can potentially be reduced by the use of “self...
While it only makes sense to assume that a cybercriminal would focus specifically on those targets that would bring them the greatest profit—in other words, larger businesses—the reality of modern cybercrime renders this assumption grossly outdated. ...
If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered. The n...
A virtual private network, or VPN, is a critical part of keeping your business safe while operations are taking place out of the office, but a discussion needs to be had about what a VPN can do and what a VPN cannot do. This is especially important t...
As time has passed, more focus has been put on balancing a user’s identity authentication in terms of its convenience versus its security. This is what has led to the development of solutions like Windows Hello, the biometrics-based system that Micro...
We’ve all been in a place where the storage on our computer fills up a little too quickly for our liking. While you could delete or store unused files in the cloud, there is another method that you can use to quickly free up a little extra space that...
Google Chrome is a very popular browser nowadays. In June of this year, for example, about 65 percent of the overall browser market share was attributed to Chrome. Seeing as so many people utilize Chrome, we thought it would be helpful to share a few...
Cybersecurity is one of those components to an IT strategy that is absolutely critical; you cannot ignore it in today’s age of ransomware and other high-profile hacks. In order to make sure that you are prepared to handle anything that comes your way...
“Hackers are a serious threat to modern businesses” isn’t exactly a novel statement, is it? However, if a hacker was to be lurking on your network, would you know the signs to help you catch them? Just in case, we wanted to share a few strategies tha...
Nothing is more frustrating than going to log into your device and finding out that you either cannot access it or that files you thought were there have been wiped. Unfortunately, this is the situation that many users of a specific device have recen...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions