The folks at Google have been nice enough to create a checklist to help you secure your system – it’s mostly a collection of best practices known to those in information security, but maybe less obvious to the general user populace. Either way, it would be beneficial for any GMail user to work through the …