Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Credentials used in two-factor authentication vary depending on which services are available. It largely depends on the hardware solution; for example, you could have a SMS message sent to your smartphone, or a phone call with an automated recording. Other times it could be a PIN, or a biometric system using a fingerprint scanner or facial recognition software.

You’ll find two-factor authentication on most websites that require personal information from the user, like shopping, banking, or email websites. Gmail specifically offers a setting that lets you set up two-factor authentication in just a few minutes.

  • Log into the computer of your choice, but make sure to keep your phone nearby. The two-factor authentication setup process needs to be performed on a computer.
  • Access Gmail, and click on the icon in the top-right corner of the screen. It will be whatever your account’s profile picture is, or just an icon with the first letter of your name. Click it to make a menu box appear, and select My Account.
  • This brings you to your Google Account area. On the left side of the screen, you’ll see the option Signing in to Google right underneath the Sign-in & Security heading. Click it.
  • You’ll be signed into your Google account. Once you’ve done so, look for 2-Step Verification. Make sure it’s set to On. Then, you’ll see an introductory screen. Next, click Get Started and re-enter your password.
  • You’ll be asked to plug in your phone number. Once you select your country from the drop-down list and input your preferred phone number (a smartphone is recommended), you’ll select to either receive a call, or a text message.
  • Select Try It. You should receive a verification code sent to your phone via your previous selection. Plug the code into the confirmation screen and click Next.
  • Google will ask if you’d like to turn on two-factor authentication. Since you obviously do, Gmail will display a confirmation window. It will then send you a confirmation email. The next time you log into your Gmail account, you’ll be asked to enter a code that’s been sent to your selected phone.

It’s that easy; you now have your Gmail account protected via two-factor authentication. For more handy tech tips, be sure to subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 26 April 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Software Business Computing User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Mobile Device Management Money Network Employer-Employee Relationship Managed Service Provider Outlook Two-factor Authentication History Small Business Phishing App Wireless Technology Android Mobile Computing Smartphones Apple Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Data Firewall Windows Experience Content Filtering Cybercrime Website Micrsooft Presentation Visible Light Communication Entrepreneur Disaster Domains Data Management Monitors Business Growth Robot Hacker Advertising Recovery Society Sports Spam Displays Google Wallet Application Customer Service Information Technology Running Cable Windows 8 Internet of Things Windows XP End of Support IT Services Hosted Solution Artificial Intelligence Router Documents Office 365 Tech Support Compliance Writing Drones Analytics Social Saving Money intranet Lithium-ion battery Printer Browser Virtual Desktop Wireless Unified Communications Securty Social Networking Document Management Encryption Public Speaking SaaS Retail VoIP Law Enforcement IP Address Virtualization Cortana Proactive IT Government Managed IT services Network Congestion Augmented Reality Save Money Keyboard Search Music User Hard Drives Bluetooth Remote Computing Cryptocurrency Shortcut Laptop Automation IBM DDoS Heating/Cooling Education Word Memory Google Docs Cleaning Holiday Deep Learning Processors Black Market YouTube Office Tips LiFi Business Management BDR Staffing BYOD Downtime Streaming Media Vendor Management Help Desk Passwords Competition
QR-Code