We’ll start with something simple but very important – a Google account password. Use the best passwords, preferably one that is long, complex, and doesn’t involve easy-to-find personal info, common words or patterns, or anything else you use anywhere. Give your Google account a second layer of protection. No matter how strong your Google account password is, there is always a chance that someone can crack it. With two-factor authentication, you will be asked for a second form of security besides your password, Whatever path you choose, having that second layer will make it very difficult for anyone to log into your Google account.
Google will detect some kind of suspicious activity in your account, Google may require you to verify your identity before allowing you to sign in. And if you haven’t looked at your account verification settings for a long time, there’s a high chance that the required information is out of date or missing altogether. Take a minute to go to the Google account security site and look under the section labeled How we can verify it’s you. There, We will see two options:
1. Recovery phone
2. Recovery email
When you set up an app that interacts with Google in some way on your phone, on your computer, or even within Google services like Gmail or Docs, that app is granted a certain level of access to your Google account data. Depending on the situation, it could mean he can see some of your activity within certain Google services; it could mean being able to see everything in your Gmail, Google Calendar, or Google Drive or it could mean being able to see everything in your entire Google account. Visit Google’s third-party app access and see a list of connected services. If you see something there that you no longer use or don’t recognize, click it and then click the button to delete it. Do a review of your list of third-party apps and remove any items that no longer require access to your Google account. Allowing apps you know and trust to access your account is fine, but you want to make sure to revisit the list regularly and keep it current and as short as possible.
Also read: THE IMPORTANCE OF BREAKFAST ON CONCENTRATION FOR STUDENTS
Apps aside, you’ve definitely been logging into your Google account on a variety of physical devices over the last few months (and beyond). And often, once you’ve logged in at the system level, the device remains connected to your account and can access it no matter how long it’s been since you’ve actually used the device. We can close that loop and take back control by going to the Google device activity page. If you see any devices there that you no longer use or don’t recognize, click on the three-dot menu icon in the box and sign out of your account immediately. Another important app-related consideration, if you’re using Android, some system-level permissions like those connected to your contacts and calendars can effectively control access to data areas of your Google account, as services like Google Contacts and Google Calendar sync that data between your phone and your phone. cloud.
Chrome extensions added to potentially extend the browser’s capabilities are but the extension is also potentially jeopardize the privacy of Kita. Chrome desktop extension needed to view any part of your online activities We have to ask permission thoroughly to read and modify data on each website we visit. That means an extension that does something as simple as increasing the Gmail interface allows We save articles for later will always have access to everything we do in the browser Kita despite the fact that such programs actually only need access to a limited degree (either to the Gmail website, in the first case, or just when we click on the icon to activate the extension, in the second case). Who should we do is type chrome: extensions to the browser’s address bar, and then click the box Kita Details for each extension in the yard. Every time we see a line labeled Access site, think carefully about the level of access granted and whether it is really necessary or whether it makes sense to lower it.
When we think of third-party add-ons for our computer and cellphone, take a moment to review everything we have installed in both parts and consider how much of the program we still use.
Google has a simple system for opening Inactive Account Manager, and you’ll find tools to determine exactly what should happen if your account becomes inactive for a certain period of time. You can specify the number of months that must pass without your presence, along with the email address and phone number that Google must use to contact you for confirmation. Then, you can give Google the email address of the person you want to notify once it’s clear that you’re no longer available. From there, you can determine exactly what type of information your chosen contact has access to.
Inactive Account Manager is like a planning tool for all your account related data. Even if you have gone through this process before, it is a good idea to go back and review your preferences every now and then to ensure that all information is still complete and accurate.
Last but not least is a step that won’t be right for everyone but can be very influential for certain types of Google users. For anyone at increased risk of targeted attacks, Google offers a higher form of account security called the Advanced Protection Program. This program is described as suitable for business leaders, IT admins, activists, journalists, and anyone who is in the public eye and is likely to be sought after by someone looking to harm. This puts a series of heavy-duty restrictions on your Google account to make it harder for others to gain access — but as a result, it also makes things a bit more difficult for you.