Blog

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Gmail is as secure as any comparable email platform, but there may be some messages you send that you’d rather not have hanging around in someone’s inbox. However, did you know that Gmail enables you to send messages that delete themselves after a set timeframe… while also preventing the contents from being forwarded, downloaded, copied, or printed?

Introducing Confidential Mode in Gmail

We’ve all seen the spy movies where an agent’s briefing contains instructions to destroy the message inside to ensure that the details it contains are never leaked—sometimes, the message itself is rigged to take care of the destruction on the agent’s behalf.

Think of Gmail’s confidential mode as a digital version of that: you can send an email to another user (regardless of the email client they use to read their messages) that will expire after the amount of time you specify. You can even add an extra layer of security by sending your recipient a passcode via text message that they must provide to read the message at all.

Let’s go over the process for creating such a message in Gmail.

How to Use Gmail’s Confidential Mode

First, there’s the obvious step: accessing Gmail. Start your message by clicking the Compose button at the top-left of the page. In the window that appears, you’ll find a row of icons next to the Send button, one of which appearing as a padlock and clock. This is the button to Turn confidential mode on/off. Clicking it will pull up the Confidential mode window.

There, you can set the message’s expiration date to meet various options, ranging from a day to five years, and even require the user to input a passcode that Google will generate, either sending it to their email or via SMS. If you do require a passcode, you’ll be prompted to provide the phone numbers for both you and the recipient.

The mobile version of Gmail also offers confidentiality, with a very similar process. To compose a confidential message, open the triple-dot menu and—selecting Confidential mode—set it to your preferences.

While any information sent over the Internet cannot have its safety guaranteed, encrypting your more sensitive emails is certainly advisable.

For more handy IT tips, security best practices, and the like, make sure you keep coming back to our blog!

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Smartphones may have been some of the first Internet-connected mobile devices, but they are still as vulnerable to attack as ever. This is especially true for those who forsake any sort of mobile device security policy. With modern businesses utilizi...
Today’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason ...
The online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and...
Google’s web browser Chrome has a ton of nifty features that users can take advantage of. One of them is the ability to “lock” browser windows, and to allow only certain guest users access to the Internet through Google Chrome....
It’s the nature of technology to grow more complex over time, and as it does, the types of threats grow alongside it. Security is now more important than ever before, and if your business is not prepared to handle the threats that lurk in the shadows...
As your company expands, you’re beginning to realize that one IT person isn’t enough to handle all of your technical needs. You feel like you need more hands on deck, but your budget won’t allow for it. You decide that your best option is to hire slo...
Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security c...
Accessibility and mobility are important parts of a business’s data infrastructure. To this end, some businesses take advantage of a Virtual Private Network (VPN), which has the power to extend a personal network over a private network like the Inter...
As a business owner, your mind is always on your technology and whether or not you should upgrade it. But, how much of your old technology is still lying around the workplace? You might have rooms completely filled with old IT equipment. If this soun...
With more businesses moving toward Bring Your Own Device (BYOD) than ever before, the workforce grows more mobile by the day. These workers generally need a network connection in order to access important data and applications that are crucial to the...
Modern office workers spend lots of time entering data and crunching numbers with Microsoft Excel. Therefore, it’s essential that Excel users know how to best navigate a spreadsheet. One of the best ways to make Excel easier to use is by freezing its...
Just like Silk Road (the illegal online black market designed to smuggle drugs around the world), there exists an online trade for zero-day exploits. Unsurprisingly, hackers find it exceptionally lucrative to sell these exploits for profit. Now, ther...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions