15 ways to secure your Gmail account

0
26

In case the user loses his Gmail account, it means that more sensitive information can fall into the hands of the crooks, or that account will become a scam tool for his relatives, friends and colleagues around.

Gmail is an email service that is used in many offices, offices and schools today. In case the user loses his Gmail account, it means that more sensitive information can fall into the hands of the crooks, or that account will become a scam tool for his relatives, friends and colleagues around.

In fact, network attacks through Gmail are on the rise, and today’s hackers are becoming increasingly sophisticated in attacking your email. And In addition to Gmail, users only need to have one account to access all Google products, and expose a Gmail password that implies many other service accounts.

However, with just the basic to advanced steps reviewed by the Google Forum Teamer below, you’ll be able to protect your Gmail account much safer.

11 best Gmail security tips from a Google expert

Step 1: Check for viruses and malware.

Always use a reputable anti-virus software; Regularly run the scanning process with trusted antivirus software. If the scanning detects any suspicious programs or applications, delete them immediately. You can learn more at the Google Safety Center .

Step 2: Choose a strong password and do not match another page

Always choose a memorable password, but write more difficult, including letters, numbers and special characters, for example: @nhy3u3m (Brother Love).

Or we can add prefixes to make it easier for us to remember, for example, setting Gm @ ily@gmail.com (GmailAnhYeuEm) password for Gmail. So each page will have a password.

Note: Do not set the password as the date of birth or phone number, because the password is easy to guess and hackers can easily detect.

Tip: You can change your password periodically every few months to ensure your privacy.

Step 3: There should be at least two Gmail accounts

Each person should have at least two Gmail accounts:

A public account, used for Internet activities. This account can be used to email with friends, relatives, or to subscribe to services such as Facebook, forums, or shopping sites, etc.

A secret account only you know. This account is used to register important services such as e-banking and as a recovery account for a public account.

  • The account creation is relatively simple and fast, just a few minutes you have a separate account for yourself and then.

Step 4: Sign up for 2 steps.

2-Step Verification is an additional layer of protection for your Gmail account. This is very important if you use or sign up for your Gmail account on a public computer at a cybercafe or photocopy shop.

You will have many options to protect your account in the following priority order:

Security key: $ 6.

Google Authenticator app : free, for smartphones

Create and print a backup code and place it in a safe place (wallet, safe box, etc.).

Backup phone number .

Whenever you sign in to your Google Account from an unknown device, Google will ask you for a verification step corresponding to the 2-step verification you have installed.

If it’s a computer you use often and do not want to repeat the verification step every time you sign in, you can check the “Do not ask again for this device” checkbox.

When using 2-step verification, do not forget to download a backup code . You can use backup codes in case you do not have access to your phone. Save it a safe place.

There are many cases where 2-step verification is used, and then lose a phone or can not use the phone at the time, which results in difficulty accessing your account. Please note this point offline!

Step 5. Add account recovery options

If you forget your password or if someone is using your account or your account is locked for another reason, the account recovery option will help you reset your password.

Account recovery options will have two options:

Phone number restored. Choose a phone number because: you receive a text message; Only you, you use often and always carry with you.

Email recovery. Choose email because: you use it often; Unlike the address you use to sign in to your Google Account.

Step 6: Complete the security check

Access your Google Account . In the “Privacy” section, look for ” Security Check ” and select Start. Then follow the steps on the screen.

Here, Google will take steps to check for unusual activity and protect the account. Make sure that the steps are marked green, that the check completes, and the account is secure.

Step 7: See Account Activity on Gmail

Viewing Account Activity helps you see if anyone is accessing your Gmail account. Although you may think the probability of this happening is very small, but better yet, check out these steps:

On your computer, open Gmail .

In the bottom right, click Details.

Tip: You can also visit the Recent Security Events page to view security updates for your entire Google Account; This window shows you the different locations where you have logged into your account. Make sure there are no strange places in the list. You can also change the alert option for “Show alerts for unusual activity.”

If you find any unusual locations, select Sign out of all other web sessions, and Change your password immediately, then follow Gmail security tips to help protect your account. .

Step 8: Control your account activity

To help Google’s services become more useful to you, Google collects data related to your account.

For example, Google may save what keywords you’ve searched for (and thereby optimize your search results). If you feel these features are unnecessary, you can turn them off.

You can control and let Google collect related information by visiting the item control activities , on or off position Activity and application Web and YouTube Watch History , Communication equipment.

The information collected will be saved on Account Activity .

Step 9: Check the settings in Gmail mail forwarding

Please periodically check your mail forwarding settings to avoid messages and information being forwarded to an address you do not know.

If you do not set up forwarding but receive a message that your mail is being forwarded to an address you do not know, change your passwordimmediately. Someone else might already have access to your Gmail account. Then turn off mail forwarding settings .

Step 10: Identify and report fraudulent messages

Phishers will often pretend to be a social networking site or online sales page asking you to send your personal information to them.

For example, a scammer can send you an email that looks like from your bank so you give them information about your bank account.

How to identify fraudulent messages ? Do not believe in sweet words or attractive promotions in the mail, but be sure to check the following if you are asked to provide the following information:

User name and password, including password change

Social Security Number

Bank account number

ID number

Credit Card Number

Your birthday

Important: Google or Gmail will never ask you to provide this type of information in an email.

If you see a message asking for this information, do not click on any links, but report the scam by following these steps:

On your computer, visit Gmail .

Open letter.

Next to the Answer icon, click Add.

Note: If you are using Classic Gmail, click the Down arrow.

Click Report Phishing.

Step 11: Check your account settings regularly

On the My Account page , you can find most settings to protect your account.

Just like a regular checkup, schedule a regular check every 3 months and review the settings for adjustments.

Step 12: View and control third-party access

Some third-party services, like social networking, online music streaming, and online shopping, let you connect your Google Account to enhance your experience of use. When you connect your Google Account to a third-party service, it can send information to Google. Third-party services can tell you how much Google can access your account.

You can view apps that have access to your account here : If you see an app that you have not yet granted, remove your app’s access.

Step 13. Regularly update the browser

Make sure you’ve set your browser’s auto-update mode to receive the latest security updates. If you get an update, update now.

Visit whatbrowser.org to see what version of the browser you are using.

If you see “This is the latest version” then your browser has been updated.

If you see “There is a newer version,” click Update your browser and download the latest version.

Step 14. Test your email security

Gmail protects your information by automatically encrypting your email to turn emails into code during submission; This security tool is called Transport Layer Security (TLS) and helps prevent others from reading your email.

You can check if your email is secure by looking at the email security key that appears in the compose section.

Or, in the message, press the down arrow next to me and see if the message is secure.

If this box shows the red small padlock icon is open, or you receive a message with a red padlock next to the sender’s name. This indicates that the message is not encrypted and is not secure.

For this security tool to work, both sender and recipient email providers must always use TLS. Learn more about sending email with TLS.

Step 15: Check that your mail is authenticated

In addition to secure messages, you should also check that the message is authenticated.

If you see a question mark next to the sender’s name, the message is not authenticated. When the email is not authenticated, it means that Gmail does not know if a message has arrived from the person displaying the sender. If you see this, please be careful when replying or downloading any attachments.

Note: Non-authenticated messages are not necessarily spam. Sometimes authentication does not work for organizations that actually send messages to large groups, such as messages sent to mailing lists.

Avoid clicking unrecognized links in your email. Also, be careful in downloading attachments. You should only rely on emails sent by known and familiar sources. Delete everything that looks unfamiliar or suspicious. Be more careful about emails about advertising, deals…