For many of us, the account that we made through Google is equivalent to our lives. There might be a lot of things stored in there, such as passwords, bits and pieces of important information, and even the many meetings that you have within its proprietary calendar app. Furthermore, many individuals use Gmail to be their primary emailing platform. With these being said, it is of no question why many would opt to secure their accounts in the best way possible.
Securing Your Google Account
Step 1 – The first thing you have to do to start securing your account in Google is to make a security checkup. Doing this is quite easy because all you have to do is make use of the built-in Security Checkup tool which can be found within your account’s “Sign & Security” page. Once there, you will be directed to a menu wherein you would just basically have to review and confirm some pieces of information. This won’t take too much of your time so you would definitely want to start with a security checkup first.
Step 2 – The next thing you would have to do is to set up a recovery phone and email for your Google account. The recovery email and phone number listed down here will be the ones used whenever you get locked out of your account (by some reason). Hence, you have better make sure that all the information listed here is correct. Also, whenever your account has been logged in a new location, the platform will send an email to the recovery email about the activity.
Step 3 – Another way to secure your account is to see the recent security events. In fact, this happens once you confirmed your recovery email and phone number. If there hasn’t been any security-related changes towards your account, then there’s nothing to worry about here. However, if by any chance that there are changes, then you would definitely want to take a closer look because that would indicate that there has been some suspicious activity floating around your account.
Step 4 – Upon confirming the events (if there are any), you will be brought to see what devices are connected to your account in Google. With technology evolving each day, we can now send and receive emails, and do a bunch of other things with our smartphones, watches, tablets, and other devices. In this section, you can check if there are any suspicious devices using your account.
Share This on Facebook