{"id":179,"date":"2016-05-18T09:01:59","date_gmt":"2016-05-18T13:01:59","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=179"},"modified":"2016-05-18T09:04:02","modified_gmt":"2016-05-18T13:04:02","slug":"take-5-minutes-to-secure-your-account-and-ensure-your-privacy-with-google","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2016\/05\/18\/take-5-minutes-to-secure-your-account-and-ensure-your-privacy-with-google\/","title":{"rendered":"Take 5 minutes to secure your account and ensure your privacy with Google."},"content":{"rendered":"<p>Google has a set of online tools available for quickly checking and modifying your account settings.<\/p>\n<p>Start by going to myaccount.google.com where you can manage \u201cSign-in &amp; security\u201d, \u201cPersonal info &amp; privacy\u201d and \u2018Account Preferences\u201d. Towards the bottom of the page, you can \u201cGet Started\u201d with a \u00a0\u201cSecurity Checkup\u201d which will walk you through setting recovery options, checking connected devices and account permissions. The \u201cPrivacy Checkup\u201d tool will show you what you have shared using your Google+ profile and the types of information collected to personalize your Google experience. Settings include allowing people to search for your name, number and other information, photo settings including geographic locations and managing web &amp; app activity.<\/p>\n<p>Be sure to take some time to review what Google collects and what you want made available for people to see. You might be surprised what you find as your existing settings!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google has a set of online tools available for quickly checking and modifying your account settings. Start by going to myaccount.google.com where you can manage \u201cSign-in &amp; security\u201d, \u201cPersonal info &amp; privacy\u201d and \u2018Account Preferences\u201d. Towards the bottom of the &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2016\/05\/18\/take-5-minutes-to-secure-your-account-and-ensure-your-privacy-with-google\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":274,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/179"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/274"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=179"}],"version-history":[{"count":3,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":182,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/179\/revisions\/182"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}