Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Google Search Now Gives More Info into What You’re Clicking On

Google Search Now Gives More Info into What You’re Clicking On

While Google Search has become eponymous for “online search”, the company has not stopped innovating upon the capabilities of the service. Most recently (as of this writing, of course) one improvement that the company is making is to give more content a bit more context before a user clicks through to a potential threat.

Let’s go into what this new update will look like on your Search results pages.

The Google Page Widget

With its rollout beginning on February 2nd, your Google Searches via a desktop, mobile device, and the Android mobile app probably now offer a small widget that provides a look at the website each result directs to.

Here’s how it will purportedly work:

You will soon notice (if they haven’t already caught your attention) small three-dot menus appearing next to your search results. These menus, if clicked, will give you more information into the website the result has pulled up.

This information will include things like a blurb about the website the link directs to—if available, coming from Wikipedia, and if not, based on Google’s own analysis when the site was indexed—as well as whether the website offers a secure HTTPS protocol connection and if a link is an ad.

Here, for example, is what appears when you check the link for Facebook:

From this, we can see that Google has confirmed that the connection to the website is secured, helping to protect our data, and that the link the user has inquired about was the result of their search, not placed there as an advertisement.

Moving forward, this utility may be able to help your users make more secure choices when browsing their search results. If you have access to it, we encourage you to explore it a little more yourself—and, if you’re ever concerned about how secure your business’ IT choices have been, to reach out to 415 IT at (415) 295-4898 for an assessment.

Tip of the Week: The Guide to Optimal Password Eff...
Conduct a Security and Compliance Audit, You Won’t...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud Internet IT Services Software Email Efficiency Data Recovery Managed IT Services Business Mobile Device Innovation User Tips Google Phishing Small Business Collaboration Malware Hackers Outsourced IT Hardware Cybersecurity Workplace Tips Upgrade Cloud Computing Business Management Smartphone Computer Tech Term Microsoft Managed Service Communication Mobile Devices Android Business Continuity VoIp Backup Windows 10 Quick Tips Smartphones Covid-19 Ransomware Disaster Recovery Managed Service Provider Paperless Office Communications Browser Passwords Remote Work Encryption Network Data Management Artificial Intelligence Office 365 Wi-Fi Business Technology Users Saving Money Server Internet of Things Remote Monitoring Managed IT Help Desk Social Media BDR Microsoft Office Holiday Save Money Vulnerability Healthcare Government Document Management Compliance Windows 7 Managed IT services Windows Data Security Chrome Miscellaneous Laptops Scam Automation Facebook Applications Blockchain Health Infrastructure Virtualization Employer-Employee Relationship Information Remote Tip of the week Processor Vendor Management Project Management Machine Learning Gadgets Avoiding Downtime Analytics Two-factor Authentication Office Redundancy Antivirus Bandwidth Mobile Office Wireless Hard Drive Virtual Private Network Software as a Service Net Neutrality RMM Mobility Storage Router Proactive Meetings WiFi IT Management Data Loss Customer Relationship Management Maintenance Website VPN Information Technology Company Culture Employee-Employer Relationship Networking BYOD OneDrive Managed Services Training Regulations IoT Apps Files Access Control Holidays Vendor File Sharing Unified Threat Management Money Spam Co-Managed IT Big Data Password Tablet Word Patch Management Data Breach Internet Exlporer Bring Your Own Device Server Management Dark Web Augmented Reality HIPAA Utility Computing Smart Technology Monitoring Remote Computing Remote Worker Computing Free Resource Assessment File Management Remote Monitoring and Management Financial Alert Operating System Recycling Payment Cards Data Storage Network Management Voice over Internet Protocol Images 101 Consultation Mobile Security Employees Display Flexibility Electronic Health Records Unified Communications Instant Messaging Consulting Downtime Social Network Time Management Search Professional Services The Internet of Things Customer Service Gmail Managed Services Provider Risk Management Management Cooperation Remote Workers Mirgation Read Only Security Cameras Manufacturing Mouse Language Asset Tracking Mobile Computing Backup and Disaster Recovery Statistics Lenovo Virtual Assistant Bitcoin IT Consulting Batteries MSP Finance Enterprise Content Management Outsource IT Servers Samsung GDPR Break Fix Wearable Technology Point of Sale Star Wars Tech Terms Hacker Active Directory Permissions Identity Theft Conferencing Enterprise Resource Planning Outsourcing SharePoint Wireless Internet Cyber Monday Staff App Transportation Cache Printing IT Recovery Mail Merge User Error Smart Devices Computing Infrastructure Human Error Geography Peripheral Bluetooth Superfish Wasting Time Current Events Microsoft Excel CIO applications Social Networking Authentication Laptop E-Commerce Theft Optimization CES Windows Server Google Calendar Fraud Identity Video Conferencing Downloads Employer/Employee Relationships Apple Screen Reader Electronic Medical Records Banking Business Telephone Address Hard Disk Drives Sensors Alerts OneNote Modem Permission High-Speed Internet PCI DSS Database Travel Authorization G Suite Remote Working Websites Notes Virtual Reality Tech Support Features Virtual Machines Techology User Management Politics Mobile Biometric Proactive Maintenance Solid State Drive Firewall Smart Tech Reviews Private Cloud IT Assessment Solid State Drives Comparison Licensing How To Test Development Projects Procurement Credit Cards Technology Laws Value of Managed Services Technology Tips WPA3 Motherboard Chromebook Budget SaaS PowerPoint Data Warehousing IT Technicians Cost Management Outlook Disaster Resistance Teamwork Legislation Gamification Emergency Multi-Factor Security Cybercrime Cyber security Distributed Denial of Service Connectivity End of Support Migration Bookmarks eWaste ROI Digitize Printer Options Telephone Specifications Cookies Cables CRM Touchscreen Hacking Return on Investment Cyberattacks Social Computers Customer Relationships Unified Threat Management Digital Payment Hotspot Fleet Tracking Zero-Day Threat Vulnerabilities Operations Shortcut Proactive IT Shared resources Going Green Managing Stress Heating/Cooling Database Management Managed IT Service Mobile Device Management Windows Server 2008 Gifts Chatbots Favorites Shadow IT 5G Mobile VoIP Black Friday Nanotechnology Wires Content Filtering Trending Settings Personal Information Printers Education Marketing CEO Students Daniel Stevens Regulation Twitter

Latest Blog

A lot of business is being conducted over the Internet right now, in terms of communication and transactions alike, which makes a business’ capability to remain connected to its clientele even more important. Now is not the time to wonder if your business is as connected as ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...