Password Protection Feature!

It's no secret that Google tracks your activity, whether you are using it's hardware or software such as Android device, smart speaker or even just Google Chrome. But how secure is it? Find out how to increase your security here.
Content

Password Protection Feature!

In our last blog, we mentioned how the UK has seen a significant rise in Cybercrime. You can now keep prying eyes off your Google search history with a new password protection feature!

It's no secret that Google tracks your activity, whether you are using it's hardware or software such as an Android device, smart speaker or even just Google Chrome. But how secure is it? Currently, anyone who has access to a logged-in device can view this log.

Google has introduced a new way to password protect the 'My Activity' page, making it useful for those who share devices within a household or office. This feature ensures that a users web, app or location history cannot be viewed or deleted by other users.

So how can you activate this feature? Simply login into your Google account and visit the My Activity page, select 'manage my activity verification' and choose the option to 'require extra verification'. Once this feature is enabled, you will see a lock icon and a button to 'verify' your identity with a password when visiting this page - blocking off the details of the activity tracking to anyone without it.

If you are looking to increase your security further, Edmondson's IT Services can help you with our professional anti-virus, anti-spam and data backup services. To find out more about how we can help to secure your business, visit our website or call 01924 666 660 to speak to an experienced IT engineer.

'}}
9 Ways Technology Can Save Your Business Money and Time
For businesses across the globe, time and money are two of the most valuable resources. Thankfully, technology has made it easier than ever to maximise both. In this blog, we cover 9 ways in which technology can help you save money and time.
'}}
DKIM, SPF, and DMARC: Best Practices for Email Authentication
Email is a crucial communication tool for businesses and individuals alike. However, with the rise of phishing attacks and email fraud, the security and authenticity of email messages have been a growing concern for many. This is where email authentication protocols such as DKIM, SPF, and DMARC come into play.
'}}
10 Common IT Support Help Desk Problems And Their Solutions
Discover the 10 most common IT Support help desk problems and learn expert strategies to resolve them. Keep your business running smoothly and minimise downtime with these expert solutions.

© Edmondson's IT Services | Co. Reg. No: 07818717 | VAT Reg. No: GB122507059

pay nothing for 3 months

Get 3 months of IT support at no extra cost, by signing up to a 12 month contract.

pay nothing for 3 months on your IT support

what's included

BESPOKE SUPPORT

We offer a completely customised service to support your business.

PRICE MATCH GUARANTEE

We have a price match guarantee in place to ensure you're getting the best service without compromising on quality.

PROACTIVE SUPPORT

Using our internal monitoring systems, we're able to fix issues before they occur.