TechSpade.com
  • General
  • Tech
  • Entertainment
  • Science
  • Culture
  • How to…?
  • About Us
  • Contact Us
  • Privacy Policy
  • Affiliate Disclaimer
August 10, 2022
HomeTechMaximum security – How to secure your Google account

Maximum security – How to secure your Google account

May 14, 2021 admin Tech Comments Off on Maximum security – How to secure your Google account

Your Google account is one of your most valuable online tools if your online life revolves around Gmail, Chrome, and other Google apps and services. This is particularly valid if you use the Gmail account’s corresponding email address as your primary email address.

An online hacker who gains access to those credentials will cause havoc and irreparable harm to your online life, which is why it’s important to keep your Google account secure. In this article, we will tell you the steps which can help you secure your Google account from any external illegal activity.

Table of Contents

  • Strong password
  • Enable 2 step verification
  • Save recovery codes
  • Add a recovery email
  • Adding a phone as an authentication device
  • Removing text as an authentication step
  • Using a hardware security key

Strong password

For your Google account, you’ll need a solid, one-of-a-kind password. Using the password manager’s software to create a new password is the easiest way to ensure that you’ve met this criterion. Creating a new password means that your user passwords aren’t exchanged with any other accounts and that an older password you may have accidentally reused isn’t part of a password leak.

Go to the Google Account Security tab to update your password. If required, sign in, then press Password under the Signing SInto Google heading and follow the on-screen instructions to update your password.

Enable 2 step verification

Now is not the time to quit the Google Account Security tab. Instead, go to the Two-Step Verification section and check that this alternative is activated. To receive codes via text message, use the default option on a phone that you own.

The setup procedure is a simple wizard that confirms your ability to receive verification messages. Keep on the page after it’s over for the next move.

Save recovery codes

The following move is to build a list of recovery codes. If you have one of these passwords, you can sign in to your account if you’ve forgotten your password or misplaced your phone. You risk getting forever shut out if you don’t have this backup.

Find the Backup Codes option on the Google Account Security page and press Set Up. This will bring up a pop-up dialogue box similar to the one seen here, with ten codes you can use when asked for a second verification element. Print the page and keep it in the same locked file cabinet or safe where the secret is kept.

Add a recovery email

Creating a recovery email address is a crucial security measure. If Google finds unusual activity on your account, a message will be sent to this address.

If you lose your password, having a backup email is also beneficial. Resetting your password requires at least two means of authentication while two-step verification is available, such as a printed backup code and a code from an email message sent to a registered email account. You’ll need to have both of those means of verification or you’ll be shut out for good.

Return to the Google Account Security tab and select Recovery Email from the drop-down menu. Adjust or add your recovery email address. You’ll get an email to confirm that it’s ready for recovery at that address.

Adding a phone as an authentication device

Google offers you two options for using your smartphone for authentication when you register it as a trusted device. If you have a Google account on your Android smartphone, you can sign in to any Google service by answering prompts from Google. This choice does not necessitate any additional setup. This can provide an extra layer of security to your account.

Removing text as an authentication step

You should have more than enough safe ways to authenticate and validate your identity at this stage. That means the weakest link, SMS text messages, must be removed. The fact that an intruder can hijack your mobile account makes SMS text messages so dangerous from a security standpoint.

Using a hardware security key

This is the most advanced of all the measures. Since it necessitates the purchase of additional hardware, the need to plug a computer into a USB port or link via Bluetooth or NFC adds the highest degree of protection.

Related

  • account
  • Google
  • Security
Previous

Backing up your PC’s data

Next

Turning your PC on and off automatically

Related Articles

How Technology and Fashion Come Together - techspade.com
Culture

How Technology And Fashion Come Together

May 11, 2020 admin Culture, Entertainment, General, Tech Comments Off on How Technology And Fashion Come Together

How technology and fashion come together Zac Posen succeeded in coming up with a cognitive dress that changes color based on your activity upon social media; Chanel has a history of working with 3D printers […]

Tech

A hidden feature of your smart speaker!

May 24, 2021 admin Tech Comments Off on A hidden feature of your smart speaker!

The use of smart speakers such as Amazon Echo, Google Nest, etc., is becoming extremely common day by day. If you are using one of such devices, you will be aware of using commands to […]

Tech

How to secure your zoom calls in this pandemic

May 20, 2021 admin Tech Comments Off on How to secure your zoom calls in this pandemic

In this Covid post-era, the need for online calling has increased exponentially. More and more people have started working home and, in this scenario, the best tool to have is zoom online video calling. However, […]

Subscribe to TechsSpade via Email

Enter your email address to subscribe to TechSpade and receive notifications of new posts by email.

Follow us on facebook and LInkedIn

  • Facebook
  • LinkedIn

Categories

  • Culture
  • Entertainment
  • General
  • How to…?
  • Science
  • Tech
HostGator Free Domain
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Tags

10 Amazon Android apple Apple watch Apple Watch Series 6 backup cloud computer data desktop easy Encryption facebook feature file France Google HD iOS ipad Linux Mac maps Microsoft network OS password pc plus prevention pro public samsung screens Security smart smartphone Spotify tablet tablets United Kingdom virtual WiFi Windows
Find the perfect .COM starting at just $.99*! Shop Now!

Follow on Facebook

Recent Posts
  • Keeping your data secured in these days of security breaches
  • Caution! Update your browsers asap
  • Application crashing? Try these troubleshooting tips
  • Tidying up your messy Facebook page
  • How can magnets help in making a computer?
Archives
  • August 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • January 2021
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • May 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • July 2018

(c) by TechSpade.com

Pin It on Pinterest

Share This
  • Facebook
  • Twitter
  • Google+
  • Pinterest
  • Print Friendly
  • reddit
  • LinkedIn