Author Box
Articles Categories
All Categories
Articles Resources

Google's Responsibility and 2 Step Verification

April 10, 2012 | Comments: 0 | Views: 77

Google's Larry Page has stepped up security measures as Google's new CEO ever since Eric Schmidt stepped down in 2011. Google, the most widely used search engine in the world, is popular among users because it is valuable for their users by showing them the most relevant search results when users are looking for something. By offering such a great user experience, they have a very direct relationship with their users. When a user wants to search an image or product, Google's search algorithm "magically" compiles relevant search results. In a swiftly changing industry, Google has managed to stay innovative. Users don't always like the changes, but some grow to love them. When Google releases a product that isn't up to par to user's expectations or doesn't work, they know that it's easy for users to go to their competition which is a click away. User's have a lot of trust in Google with their searches and especially with their data in emails, documents, pictures, and accounts.

To retain the trust and ensure that user's information is safe, Google invests in security and tools for users such as 2-step verification (also called two factor authentication) and encryption. Their security efforts help thwart unauthorized access to user's information and also increases trust with Google and their users. Google also recently changed their privacy policies, which gained a lot of interest from users, but ultimately changes were made so that Google can create a more intuitive experience across their products and create a better user experience for its users. Larry Page's update within Google's privacy policy was to create a more seamless experience across its services and products. A way to create a more seamless experience is for users to stay logged in while using Google products such as Google Chrome, Google Docs, Gmail,, Google+, and Google Play.

Google's implementation of security features like two factor authentication help improve the user experience by decreasing the likelihood of information and accounts being compromised. One way a user can be verified using two factor authentication is by logging into their account using their login credentials and at the same time a one-time password is sent to their mobile phone to be entered into the website where access is being granted to verify them. This is a powerful way to authenticate users because not only do they use their login credentials to login (using a login and password), they are sent a one-time password to their mobile device which let's Google know that they are who they say they are. The great thing about this two factor authentication method is that most users always have their cell phone on them so verifying them doesn't require the users to carry any additional hardware or software to install. Users just need to be able to receive text messages through their mobile devices and they can receive a one-time password that hackers and intruders won't even be able to access even if their logins are compromised. With over 100 million users active on Google+ and over 3 billion searches on Google's search engine per day, security is a concern for users and implementing 2 step verification is a great way to ensure that user's information remains safe and Google can continue improving the experience for us all with all their products and services.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:

Two Factor Authentication


2 Step Verification


Google Authentication


One Time Password


Web Security

Teenage rebellion is easier to tolerate in book or film form. Take a look back at some of the most well known and loved "coming of age" stories set in boarding schools.

By: Harvey McEwan l Arts & Entertainment l July 10, 2012 lViews: 445

An important thing you have to consider before working out is having a pair of great training shoes. You cannot immediately undergo any physical training wearing inappropriate footwear. If you do so,

By: Steve Hill l Recreation & Sports l July 10, 2012 lViews: 349

Granite is one natural stone that is used for several purposes from dimension stone to countertops to sculptures. The use of granite for building the temples and monuments was initiated millions

By: Steve L Patterson l Arts & Entertainment l July 10, 2012 lViews: 298

Up to 65,000 H-1B visas for new employment may be issued each fiscal year (FY) for professional workers, including medical providers. In general, a person who already has an H-1B and applies for

By: Ann Badmus l Arts & Entertainment l July 10, 2012 lViews: 309

Beside coin shooting, gold detecting or the many other things you can do with your metal detector. There is a large group of people who take their metal detector out looking for old stuff. Not just

By: Candy L Lindsey l Recreation & Sports l July 07, 2012 lViews: 293

Many people want to be writers and you may be one of them. In order to make your dream occupation a reality, you need to have a plan. You also need to work on this plan constantly. These tips from a

By: Harriet Hodgson l Writing & Speaking l July 06, 2012 lViews: 440

Have you ever needed portable power in a hurry? Temporary rental generators can help produce the power you need.

By: Todd Deall Computers & Technologyl June 06, 2012 lViews: 139

Technological expertise and talent are extremely valuable to many areas of modern industry. Hiring for this kind of skill often requires a special agency to match applicants with the right companies.

By: Jessica Lanel Computers & Technologyl June 06, 2012 lViews: 129

Computer issues can be tricky. Sometimes they can just happen without any warning. Issues may arise due to a power surge, a hardware failure, a virus, etc.

By: Daniel C Zical Computers & Technologyl June 05, 2012 lViews: 138

Information Technology is indeed one of the most fascinating and promising industries across the world. The rapid growth of this field is as a result of the roles played by the software development

By: Walt Generes Soltl Computers & Technologyl June 03, 2012 lViews: 155

CRM Customer Relationship Management plays an important part of any business and organization. With automation of every aspect of a business organization CRM is being automated too.

By: Neetu Jawlel Computers & Technologyl June 03, 2012 lViews: 163

Payroll Software is the most efficient and effective means of managing the financial accounts of an organization. The Payroll Software is basically a tool which handles, salary, bonuses, rewards,

By: Neetu Jawlel Computers & Technologyl June 03, 2012 lViews: 143

Users of the game Diablo III have had many of their online valuables wrongfully stolen from them. Some of the valuables consist of online currency and precious hard to obtain gear.

By: David Kyl Computers & Technology > Computer Forensicsl June 21, 2012 lViews: 156

Discuss this Article

comments powered by Disqus