Contact us today!

FRS Pros Blog

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Tip of the Week: Use Confidential Mode in Gmail to Feel Like a Secret Agent (or Secure Your Emails)

Gmail is as secure as any comparable email platform, but there may be some messages you send that you’d rather not have hanging around in someone’s inbox. However, did you know that Gmail enables you to send messages that delete themselves after a set timeframe… while also preventing the contents from being forwarded, downloaded, copied, or printed?

Introducing Confidential Mode in Gmail

We’ve all seen the spy movies where an agent’s briefing contains instructions to destroy the message inside to ensure that the details it contains are never leaked—sometimes, the message itself is rigged to take care of the destruction on the agent’s behalf.

Think of Gmail’s confidential mode as a digital version of that: you can send an email to another user (regardless of the email client they use to read their messages) that will expire after the amount of time you specify. You can even add an extra layer of security by sending your recipient a passcode via text message that they must provide to read the message at all.

Let’s go over the process for creating such a message in Gmail.

How to Use Gmail’s Confidential Mode

First, there’s the obvious step: accessing Gmail. Start your message by clicking the Compose button at the top-left of the page. In the window that appears, you’ll find a row of icons next to the Send button, one of which appearing as a padlock and clock. This is the button to Turn confidential mode on/off. Clicking it will pull up the Confidential mode window.

There, you can set the message’s expiration date to meet various options, ranging from a day to five years, and even require the user to input a passcode that Google will generate, either sending it to their email or via SMS. If you do require a passcode, you’ll be prompted to provide the phone numbers for both you and the recipient.

The mobile version of Gmail also offers confidentiality, with a very similar process. To compose a confidential message, open the triple-dot menu and—selecting Confidential mode—set it to your preferences.

While any information sent over the Internet cannot have its safety guaranteed, encrypting your more sensitive emails is certainly advisable.

For more handy IT tips, security best practices, and the like, make sure you keep coming back to our blog!

Improving Society Through Technology
Some IT Changes Can Be Problematic for Your Busine...

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Hackers Internet Software Google User Tips Innovation Efficiency Cloud Hardware Workplace Tips Microsoft Data Email Communication Hosted Solutions Business Smartphones Small Business Computer Business Management IT Support Mobile Devices Android Cybersecurity Data Backup Windows 10 Backup Malware Tech Term Collaboration IT Services Disaster Recovery VoIP Browser Phishing Smartphone Upgrade Data Recovery Users Office 365 Outsourced IT Windows Gadgets Miscellaneous Communications Internet of Things Ransomware Apps Quick Tips Information Cloud Computing Network Covid-19 Mobile Device Cybercrime Business Continuity Social Media Saving Money Data Security Managed Service Microsoft Office Automation Passwords Managed IT Services Health Operating System Blockchain Facebook Mobile Device Management Wireless Money Artificial Intelligence Two-factor Authentication Information Technology Holiday Alert Law Enforcement Save Money Conferencing Employer-Employee Relationship Vulnerability Server OneNote Best Practice Mobile Office Managed IT Services Managed IT Networking Wi-Fi Spam Virtualization IT Support Applications Chrome Printing Bring Your Own Device Vendor Battery HIPAA Password Remote Managed Service Provider Risk Management Hacking Retail Remote Workers Windows 10 Unsupported Software Augmented Reality Windows 7 Gmail BYOD Word App Computers Patch Management Project Management Router Bandwidth BDR Google Drive Settings Data Breach Data Storage Telephone Systems WiFi Access Control Tech Support Paperless Office Excel Encryption Mobile Security File Sharing Audit Safety Going Green Social Telephony Apple Fraud Government Meetings Smartwatch Google Assistant Sales Data Protection Evernote Instant Messaging Hybrid Cloud Robot Voice over Internet Protocol User Error Wireless Internet Cost Management IT Management The Internet of Things Cortana Marketing WannaCry VPN iPhone Business Technology Data Loss Commerce Software as a Service Update Shortcut Hard Drive Display Politics History Budget Training Wireless Charging Google Docs Human Resources YouTube SaaS Devices Wireless Technology Proactive IT Payment Cards Data Management Hosted Solution Search Touchscreen Avoiding Downtime Mobility Management Productivity Travel Application Sports Chromecast Computer Care Nanotechnology Projects Screen Mirroring Antivirus Firewall PCI DSS Security Cameras eCommerce Biometrics OneDrive Unified Threat Management Workstation Touchpad PowerPoint Admin Compliance Break/Fix Internet Exlporer Tablets Maintenance Hyperlink Solid State Drive Proactive Virtual Private Network Machine Learning Sync Root Cause Analysis Hacker Hosted Desktop End of Support Identity Printers Storage Emails Social Engineering Cast Processor Regulations Compliance FAQ Computer Fan Emergency Fiber Optics Employee-Employer Relationship Uninterrupted Power Supply Upgrades Edge Development Telework Humor Saving Time Medical IT NFL eWaste Point of Sale Server Maintenance Remote Work Value Wasting Time Hard Disk Drive Websites Innovations Amazon Downtime Keyboard Smart Devices Data Privacy Identities Entertainment Benchmarks Policy Personal Information Charger Holidays Ciminal Identity Theft Micrsosoft Audits Gamification Keyboard Shortcuts Remote Working Reputation 5G DDoS Device Security Office Investment Net Neutrality Accessory Files Data Theft IT Solutions Managed IT Service Virtual Assistant E-Commerce Recovery Adobe Workers Sabotage Troubleshooting Data storage Disaster Legislation Webinar Language Myths Procedure Copiers Remote Computing Testing Consultant Vendor Management Business Intelligence Solutions Memory Managed Services Provider Reviews Windows Ink Remote Monitoring Scam ROI Internet Service Provider Computer Forensics Peripheral Gifts Computing Alexa for Business Administrator Licensing Updates Education PC CRM Chromebook Co-Managed Services Comparison IT solutions Threats Video Conferencing Streaming Media Outlook Inventory Camera Lithium-ion battery Microsoft Excel IT budget Samsung Digital Signage Printer Financial Payroll Facebook Privacy Managed Services Transportation Employees Google Maps Spyware Windows Server 2008 R2 Laptop Credit Cards iOS App store WIndows Server 2008 Private Cloud Employee Access Microsoft Word AI Telephone Specifications Windows 10s Virus HBO Legal Scams Organization es Save Time Communitications Congratulations Computer Accessories Smart Technology Flexibility Music HaaS Relocation Regulation Scalability Analytics Black Market Cleaning Cache Automobile PDF Twitter Big Data Managing Stress Mobile Computing Monitors USB Worker Text Messaging How To Books Television CrashOverride Hiring/Firing Video Games Experience Company Culture Virtual Reality Work/Life Balance Electronic Medical Records Thank You Crowdsourcing Employer Employee Relationship Office tips Current Events Benefits Advertising Phone System