Google Workspace Guides

  • Improve your Google Workspace security by adding a Super Admin account
    A comprehensive guide to improving your small business Google Workspace security by setting up a separate Super Administrator account
  • Google Chat – the definitive guide for Google Workspace administrators
    This is a complete guide to Google Chat for Google Workspace administrators. Learn how to set up and administer Google Chat in a small business with this simple to understand, but in-depth post.
  • Staying safe with Google Workspace and 2 step authentication
    I’ve previously written about using 2 factor authentication (2FA) to stay safer when using your Google account, even as a sole trader. I also mentioned how that particular authentication technique couldn’t be used with Google Workspace. However, there is another version of 2FA or two-step verification that can be used by Google Workspace users which […]
  • What is multi-factor authentication and do I really need it as a sole trader?
    Alright welcome back to the 3rd in our Stay Smart Online series for Stay Smart Week 2019. Today I’m writing about multi-factor or 2 step authentication. This is sometimes abbreviated to 2FA (which does not mean what I first thought, when I saw those letters!) Firstly, what is 2FA? Essentially it means there are two […]
  • What is a password manager and why do I need one?
    Last week I wrote about cyber security specifically passwords and passphrases and how using a password manager could help. What is a password manager? Password managers pretty much do what the label says – they allow you to store all your passwords in a virtual safe. All you need to remember is the safe’s ‘combination’ […]
  • Why do I need to worry about cyber security? I’m just a sole trader!
    Being online and digital is great – it can save small businesses (including sole traders) time, and allow owners to work ‘anywhere, anytime’. But with that connection also comes risk. We’ve all heard of online scams that target individuals and security breaches targeting large companies with the end result usually a request for money or […]