BNMC Blog

Tip of the Week: Activating Self-Destruct in a Gmail Message

Tip of the Week: Activating Self-Destruct in a Gmail Message

We’ve all received those emails that have some level of sensitive data in them, and we’ve all sent our fair share of them as well. However, one almost has to wonder—how secure is this data as it sits around in someone’s inbox?

Fortunately, Gmail has a feature that allows you to address these fears by scheduling a time for these emails to be deleted automatically, while also barring them from being shared.

Confidential Mode in Gmail

Gmail’s Confidential Mode basically gives the user the capability to set an expiration date for the emails they send. Plus, you can even lock your message behind a passcode that can be shared via text to the intended recipient.

Using Confidential Mode

With the Compose window pulled up, look next to the Send button for a little icon that looks like a padlock and clock. This is the button that toggles confidential mode. Clicking it will pull up a window in Confidential mode.

This window will let you set your message’s expiration date, ranging from one day to five years, and the aforementioned passcode. Setting the passcode will prompt you to provide your own phone number and the one you want your code shared to.

If you’re using your mobile device, you can compose a confidential email by opening the three-dot menu and selecting Confidential mode, setting your preferences accordingly.

While this all can help boost your email’s security, it won’t necessarily guarantee it, of course.

If you want to find out more tips and tricks to make the most of the IT your business relies on, reach out to BNMC at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, May 10 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.bnmc.net/

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Cloud Email Privacy Software Network Security Hackers Workplace Tips Efficiency Microsoft Business Data Google Computer Hardware Hosted Solutions Malware IT Services Communication Internet IT Support Mobile Devices Mobile Device Smartphone Small Business Phishing Android Users Cloud Computing Innovation Ransomware Backup Tech Term Data Recovery Managed IT Services Windows Cybersecurity Smartphones Saving Money Information Quick Tips Outsourced IT VoIP Upgrade Miscellaneous communications Disaster Recovery Network Passwords Facebook Business Management Windows 10 Social Media Data Backup Browser Microsoft Office Server Collaboration Business Continuity Office 365 Managed Service COVID-19 Managed IT Services Productivity Internet of Things Gadgets Data Management Apps Windows 10 Remote Work Information Technology Infrastructure Save Money Analytics App Word Artificial Intelligence Gmail Vulnerability Remote Monitoring Mobile Office Conferencing Managed Service Provider Remote Workers Government Encryption Money Spam WiFi Router Chrome Google Drive Company Culture Tip of the week Website Virtual Reality Employer-Employee Relationship Networking Holiday BYOD VPN IT Support Access Control Paperless Office Data Security Applications Display Settings Compliance Virtual Private Network Social Managed Services Employee-Employer Relationship Unified Threat Management Content Filtering Bandwidth Robot YouTube Automation Maintenance Apple Risk Management Firewall Education End of Support Storage Avoiding Downtime Antivirus Development Document Management Office Tips Wireless Hacker Wi-Fi Data storage HIPAA Virtualization Big Data BDR Computers Computing IT Management Operating System Business Technology Business Intelligence LiFi Budget Touchscreen Hosted Solution Managed IT Humor Administration Monitors Tablet Data loss Best Practice Vendor Management How To Regulations Mouse Blockchain Telephone Systems Chromebook desktop OneNote Cryptocurrency Going Green MSP Data Breach Augmented Reality Two-factor Authentication Managing Stress Windows 7 IT Software as a Service Social Network Free Resource Managed IT Service Printing Remote Computing Customer Relationship Management Scam Password Vendor Solid State Drive Images 101 Break Fix SaaS Laptop Search Identity Theft The Internet of Things Training iOS Hard Disk Drive Mobile Security Retail Alert Downtime Outlook Cybercrime Remote Server Management Marketing Bring Your Own Device Scalability Asset Management Work/Life Balance Microsoft Excel Hotspot Internet Exlporer Virus Google Maps Customer Service Battery SharePoint Optimization Utility Computing Office Samsung K-12 Education Smart Technology Connectivity Updates Typing Health Peripheral Private Cloud Techology IT Technicians Current Events user treats Statistics Modem FinTech Mixed Reality Shadow IT Tech Support Lenovo Staff Leominster Device Reducing Cost Halloween Migration Consulting Memes Mail Merge Language Value LED Threats Files Downloads Mirgation Recycling Laptops Social Engineering Instant Messaging Shortcut Distributed Denial of Service IoT PowerPoint Digital Payment Management VoIP Unified Threat Management IT solutions Twitter Shopping Bluetooth Comparison Cookies Digital Gamification Google Docs Websites Firefox Superfish K-12 Schools Mobility Batteries Meetings Disaster Scary Stories Social Networking Address Permissions Computing Infrastructure Professional Services Co-Managed IT Hacks RMM Chatbots eWaste Managed Services Provider Safety Google Wallet Patch Management Star Wars Onboarding GDPR Bitcoin Policy User Error Running Cable Uninterrupted Power Supply Employees Specifications Buisness Nanotechnology Slack Hard Disk Drives Spyware Business Growth Wearable Technology Network upgrade Print Toner Myths Heating/Cooling Multi-Factor Security Sports Motherboard Cables Messaging Computer Care IBM Holidays Legal Virtual Desktop Alerts USB Content Huawei File Sharing Network Congestion Banking Identity Continuity Entertainment Unified Communications Distribution Drones Fraud Cost Management Digital Signage Data Warehouse Windows 8 Procedure Time Management Printer Writing Gig Economy Black Friday Screen Reader Charging Monitoring Solid State Drives Smart Office Shortcuts Mobile Management Reviews Servers Google Calendar Wires Employee-Employer Relationships Corporate Profile Deep Learning Payment Card Emergency Licensing Dongle Streaming Processor Mobile Device Management Solar Hybrid Cloud G Suite Logistics 2FA Dark Web Assessment Troubleshooting Business Analysis Automobile Dark Data Update PCI DSS Network Management Security Cameras Profiles Dell FBI Cyber Monday Smart Tech Spying National Security Alt Codes Work Legislation Voice over Internet Protocol Analysis Students WannaCry Inventory Politics Cooperation Service Level Agreement Human Error Memory Cabling Taxes How To Printers Administrator Recovery Web Server what was your? IT Budget Black Market GPS IT Consultant Law Enforcement Cameras Notifications Electronic Medical Records Tracking Physical Security Cleaning Upgrades Gadget Financial Emoji CCTV Crowdsourcing Personal Information Botnet Webcam 3D Printing Cortana Error Point of Sale Ben McDonald shares Processors Machine Learning Unsupported Software Travel Regulation Supercomputer CrashOverride Computer Repair Relocation Mobile Computing Staffing Mobile Data Motion Sickness

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3