Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Know if Someone Else is Using Your Google Account

b2ap3_thumbnail_security_for_your_google_account_400.jpgHow often have you logged into your Google account, only to find that there’s some suspicious activity going on? You might wonder why, where, and how this happened, but in case you weren’t aware, you can access some of this information by simply checking out your Google account’s security settings. Here’s how it’s done.

First, you want to sign into your Google account. Then, click the grid-like icon in the top right corner of the screen, next to your account name. Click on My Account.

google sec ib1

You’ll be taken to a central hub where you can access all sorts of settings for your Google account. For now, click on Sign-in & security.

google sec ib2

You can either scroll down to the Device activity & notifications section, or select it from the left sidebar. Either way, you’ll be able to see which devices were recently used to access your Google account.

google sec ib3

From here, you can click on Review Devices for a more thorough look at what’s going on behind the scenes, including time of access, the browser used, approximate access location, and even the country. It’s very useful for finding out who is accessing your account, and why.

If you notice that there is some activity that you might not recognize, reset your password and set up security notifications that will alert you if a hacker (or otherwise malicious person) attempts to sign into your account. Not only can this inform you that you’re being targeted, but it also gives you a chance to integrate more powerful security features that can help prevent future security mishaps.

It should be mentioned that there are a lot of other super useful features that are available through your Google account settings, like two-step verification, recovery options, password resetting, and app settings. It’s important that you take the time to go through these settings and ensure that they maximize the security of your account. All it takes is a hacker infiltrating your account once to make a fool of you, so take proactive steps to avoid this at all costs.

For more tips on how to secure your online accounts, be sure to subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 02 May 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Gmail Ransomware Hardware Apps Operating System Business Continuity Disaster Recovery Communication Hacking The Internet of Things Social Media WiFi Bandwidth Facebook Microsoft Office Office Backup Cybercrime Wireless Technology Website Android Apple Best Practice Employer-Employee Relationship Alert History Two-factor Authentication Networking Smartphones Data storage Small Business Phishing Data App Windows Experience Mobile Computing Big Data communications Safety Unified Threat Management Money Quick Tips Mobile Device Management Network Managed Service Provider Outlook Firewall Content Filtering Compliance Monitors Tech Support Drones Business Management Social Competition Browser Displays Printer Presentation Virtual Desktop Entrepreneur Wireless Domains Unified Communications Securty Encryption End of Support Document Management Law Enforcement Hacker SaaS VoIP Proactive IT Application Cortana Writing Network Congestion Customer Service Save Money Music Router Laptop Office 365 Cryptocurrency IBM Retail Google Docs Analytics Education Saving Money Holiday intranet Lithium-ion battery Cleaning Black Market YouTube Processors Managed IT services Office Tips LiFi Staffing Downtime Social Networking BYOD Passwords Public Speaking Streaming Media Help Desk Bluetooth Micrsooft IP Address Visible Light Communication Virtualization Disaster Automation Business Growth Data Management Government Memory Robot Augmented Reality Advertising Keyboard Recovery Sports Search Deep Learning Society User Google Wallet Hard Drives Spam BDR Remote Computing Information Technology Shortcut Running Cable Internet of Things DDoS Vendor Management Windows 8 Hosted Solution Heating/Cooling Windows XP Word IT Services Artificial Intelligence Documents
QR-Code