Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Credentials used in two-factor authentication vary depending on which services are available. It largely depends on the hardware solution; for example, you could have a SMS message sent to your smartphone, or a phone call with an automated recording. Other times it could be a PIN, or a biometric system using a fingerprint scanner or facial recognition software.

You’ll find two-factor authentication on most websites that require personal information from the user, like shopping, banking, or email websites. Gmail specifically offers a setting that lets you set up two-factor authentication in just a few minutes.

  • Log into the computer of your choice, but make sure to keep your phone nearby. The two-factor authentication setup process needs to be performed on a computer.
  • Access Gmail, and click on the icon in the top-right corner of the screen. It will be whatever your account’s profile picture is, or just an icon with the first letter of your name. Click it to make a menu box appear, and select My Account.
  • This brings you to your Google Account area. On the left side of the screen, you’ll see the option Signing in to Google right underneath the Sign-in & Security heading. Click it.
  • You’ll be signed into your Google account. Once you’ve done so, look for 2-Step Verification. Make sure it’s set to On. Then, you’ll see an introductory screen. Next, click Get Started and re-enter your password.
  • You’ll be asked to plug in your phone number. Once you select your country from the drop-down list and input your preferred phone number (a smartphone is recommended), you’ll select to either receive a call, or a text message.
  • Select Try It. You should receive a verification code sent to your phone via your previous selection. Plug the code into the confirmation screen and click Next.
  • Google will ask if you’d like to turn on two-factor authentication. Since you obviously do, Gmail will display a confirmation window. It will then send you a confirmation email. The next time you log into your Gmail account, you’ll be asked to enter a code that’s been sent to your selected phone.

It’s that easy; you now have your Gmail account protected via two-factor authentication. For more handy tech tips, be sure to subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Google Smartphone Windows 10 IT Support Mobile Devices Innovation Gmail Hardware Network Security Ransomware WiFi Facebook Operating System The Internet of Things Social Media Microsoft Office Bandwidth Office Backup Apps Business Continuity Disaster Recovery Communication Hacking Outlook Smartphones Two-factor Authentication History Small Business Phishing Wireless Technology App Android Apple Mobile Computing Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Data Firewall Windows Experience Content Filtering Cybercrime Website Mobile Device Management Money Network Employer-Employee Relationship Managed Service Provider Customer Service Information Technology Running Cable Windows 8 Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Router Documents Retail Office 365 Tech Support Compliance Drones Managed IT services Analytics Social Saving Money Lithium-ion battery Printer Browser intranet Wireless Virtual Desktop Bluetooth Unified Communications Securty Document Management Encryption Social Networking VoIP Law Enforcement Automation Public Speaking SaaS Memory IP Address Virtualization Proactive IT Cortana Government Network Congestion Deep Learning BDR Augmented Reality Save Money Keyboard Search Music User Vendor Management Hard Drives Remote Computing Cryptocurrency Shortcut Laptop DDoS IBM Word Google Docs Monitors Heating/Cooling Education Cleaning Holiday Black Market YouTube Processors Business Management Staffing Office Tips Displays LiFi BYOD Downtime Passwords Competition Streaming Media Help Desk Visible Light Communication Entrepreneur Disaster Micrsooft End of Support Presentation Domains Business Growth Data Management Hacker Advertising Recovery Robot Writing Society Sports Google Wallet Application Spam
QR-Code