How to make your google account more secure..!!



Make your account more secure

At Google, we take online security seriously. To protect your Google Account, we strongly recommend following the steps below regularly.

Note: If you’re a journalist, activist, or someone else at risk of targeted online attacks, learn about the Advanced Protection Program.

Step 1: Do a Security Checkup

Go to Security Checkup to get personalized security recommendations for your Google Account, including:

Turn on 2-Step Verification [Click Here]

2-Step Verification helps prevent a hacker from getting into your account, even if they steal your password. To avoid common phishing techniques associated with text message codes, choose a stronger second verification step:

Increased security: Advanced Protection [Click Here]

If you’re a journalist, activist, or someone else at risk of targeted online attacks, consider enrolling in the Advanced Protection Program for a higher level of security. Advanced Protection uses security keys to protect against phishing and includes other protections like blocking unsecure apps.

Step 2: Update your software

If your browser, operating system, or apps are out-of-date, the software might not be safe from hackers. Keep your software updated to help protect your account.

Step 3: Use unique, strong passwords[Click Here]

It’s risky to use the same password on multiple sites. If your password for one site is hacked, it could be used to get into your accounts for multiple sites.

Make sure to create a strong, unique password for each account.

Step 4: Remove apps & browser extensions you don’t need

As more apps are installed on a device, it can become more vulnerable. Install only essential apps and browser extensions on devices that have access to sensitive information. Avoid installing unknown apps or apps from unknown sources to protect your device and personal info.

Learn how to:

Note: For info on removing apps and extensions from other devices and browsers, visit the applicable support site.

Step 5: Protect against suspicious messages & content

Hackers can use emails, text messages, phone calls, and web pages to pretend to be institutions, family members, or colleagues.

Popular posts from this blog

Data Scientist In Brief!!

HOW I MANAGED TO HACK A DISCORD SERVER!!!