Contact us today!

FRS Pros Blog

Tip of the Week: Keep Your Gmail Messages Private

Tip of the Week: Keep Your Gmail Messages Private

Gmail has proven to be as secure as most other email platforms, but email is email and there are times when you send an email that isn’t opened promptly and you’d rather not have the information in that message get sent around or archived where you can’t control it. Now Gmail has added a feature that allows users to send messages that will delete themselves in a predetermined time frame, and work to keep the contents of those messages from being shared. Let’s take a look at them today.

Introducing Confidential Mode in Gmail

We’re all familiar with the secret agent that has a mission briefing that will self-destruct when it finishes. Made popular recently by the Mission Impossible franchise of movies, Gmail now gives users the ability to essentially do this. Users that don’t want messages to disintegrate over time can also send a passcode via text message that the recipient must enter to read the contents of the email. Pretty useful stuff.

Using Gmail’s Confidential Mode

Once you have the Compose window up, you will want to click on the little icon of the padlock and clock next to the Send button. This will toggle confidential mode on/off. Clicking on it will bring up a compose window in Confidential mode.

From here you can set the message’s expiration date if you so choose. It ranges from a day to five years, and you can select to provide a passcode for further security. If you do select to have a passcode, you will then be prompted to enter the phone numbers for both your phone and the recipient.

On mobile, Gmail offers additional confidentiality, using a similar process. To compose a confidential email, open the three-dot menu and select Confidential mode, and then select the preferences you’d like for that particular message. 

Obviously, this doesn’t guarantee security, but it will go above and beyond just sending a standard email. 

If you would like more tips and tricks, subscribe to our blog and check back to our site regularly.

Pros and Cons of Biometric Security
Test Your Backup Before You Regret Not Doing It

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet Software Google User Tips Innovation Efficiency Cloud Hardware Workplace Tips Microsoft Data Email Communication Smartphones Hosted Solutions Small Business Business Management Computer Business Mobile Devices IT Support Android Windows 10 Cybersecurity Data Backup Tech Term Backup Malware Collaboration IT Services Disaster Recovery VoIP Users Smartphone Data Recovery Upgrade Phishing Browser Outsourced IT Gadgets Windows Office 365 Miscellaneous Communications Internet of Things Ransomware Information Quick Tips Apps Covid-19 Cloud Computing Network Mobile Device Social Media Managed Service Cybercrime Business Continuity Saving Money Data Security Passwords Managed IT Services Automation Microsoft Office Health Operating System Blockchain Mobile Device Management Facebook Wireless Artificial Intelligence Alert Information Technology Law Enforcement Two-factor Authentication Save Money Employer-Employee Relationship Vulnerability Holiday OneNote Conferencing Server Money IT Support Managed IT Services Best Practice Managed IT Spam Printing Mobile Office Applications Virtualization Chrome Networking Wi-Fi Project Management Telephone Systems Patch Management Tech Support Managed Service Provider BDR Bandwidth Data Breach Augmented Reality BYOD Password Unsupported Software Access Control App Paperless Office Hacking Windows 10 Bring Your Own Device Gmail Router Remote Battery Vendor HIPAA Computers Data Storage Retail Risk Management Google Drive Settings WiFi Remote Workers Word Windows 7 Meetings Google Docs Shortcut Software as a Service Going Green Social Data Protection Wireless Charging Productivity Politics Devices Government Sports Hard Drive Display Human Resources Cost Management Telephony Robot YouTube IT Management Payment Cards Marketing Travel Commerce The Internet of Things WannaCry Management File Sharing Application VPN iPhone Excel Apple Fraud Encryption Safety History Sales Mobile Security Training SaaS Proactive IT Smartwatch Evernote User Error Instant Messaging Google Assistant Hybrid Cloud Hosted Solution Touchscreen Budget Wireless Internet Avoiding Downtime Mobility Cortana Voice over Internet Protocol Search Data Loss Wireless Technology Data Management Update Business Technology Audit Accessory Touchpad Myths Procedure 5G Solid State Drive Sabotage Troubleshooting Business Intelligence Solutions Windows Ink Access Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Root Cause Analysis Licensing Updates Chromecast Memory Upgrades Managed Services Provider Reviews Comparison Scam Testing End of Support Computer Fan ROI Internet Service Provider Computer Forensics Peripheral Humor Threats Video Conferencing Microsoft Excel IT budget Education Hard Disk Drive PC CRM Outlook Digital Signage Printer Google Maps Spyware Internet Exlporer Alexa for Business Inventory Credit Cards App store Samsung Chromebook Co-Managed Services Microsoft Word Financial Payroll Personal Information Facebook Privacy Managed Services Specifications Virus Camera Windows Server 2008 R2 Scams Organization Uninterrupted Power Supply Employees IT Solutions AI Legal Firewall PCI DSS Employee Reputation Webinar Antivirus Telephone Tablets Maintenance Security Cameras Consultant eCommerce Biometrics Proactive Projects Data storage Workstation PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Remote Computing OneDrive Sync Processor Regulations Compliance Edge DDoS Hacker Compliance Break/Fix IT solutions Hosted Desktop FAQ Files Hyperlink Development Telework NFL eWaste Recovery Emergency Machine Learning Fiber Optics Websites Disaster Identity Printers Saving Time Innovations Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Wasting Time Laptop Benchmarks Policy Ciminal Keyboard Transportation Medical IT Windows 10s HBO Smart Devices Charger Entertainment Value Micrsosoft Audits Device Security Administrator Amazon Downtime Private Cloud Screen Mirroring Holidays Data Theft Identity Theft Data Privacy Computer Care Nanotechnology Streaming Media Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Remote Working Legislation Language Lithium-ion battery Office Investment Net Neutrality Adobe Workers Twitter Thank You Managing Stress USB Worker How To Books HaaS Congratulations Hiring/Firing Relocation Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Cache Benefits es Phone System Save Time Communitications PDF Mobile Computing Computer Accessories Monitors Flexibility Music Smart Technology Text Messaging Television CrashOverride Company Culture Scalability Analytics Office tips Regulation Black Market Cleaning Advertising Big Data Automobile