world of internet security, latest cyber security news,information,updates on technology,it job vacancies,internet security,breaches,and safeguards

3 ways to make your Gmail account safer

  Here's a quick breakdown of how to make the most important fixes, for users of Google's Gmail.
Controls affecting Gmail security are mostly found at www.google.com/settings, or can be reached by clicking the user ID in the top right of any Gmail page and selecting "Account". (The user ID will usually be a photo or avatar, but it may just be your Gmail address if you do not have an associated Google+ account.)

1. Protect your password

Of course, start by making sure your password is well chosen and not shared.
If you need to change it, visit the Account Settings page as above and click the "Security" tab. You'll find the password settings at the top of the list.

Gmail Change password

Make sure the reset and recovery options are safe too - in the same tab, look at the "Recovery & Alerts" section. If you've already provided Google with a phone number and/or alternate email address, they'll be listed here.

Gmail recovery and alerts

Make sure they're correct, and think about whether other people may be able to get at them - if they can, they could reset your password and break into your account.
If there are no details here, you may want to think about adding some sort of recovery option in case you forget your password. These contact details are also used to send alerts when Google detects suspicious activity on your account, and the type of alerts sent can be adjusted using the "Edit" button.
Older accounts may still have a "Security question" set up, however this method of recovering an account is no longer supported so can be ignored.

2. Set up 2-step verification

Google's version of two-factor authentication, referred to as 2-step verification (2SV), can also be accessed from the Security tab on the Account Settings page.
You'll find it just underneath the "Change password" option.

Gmail 2SV

To set it up, you'll need to provide a phone number, which will be verified with an initial code sent via SMS or as an automated voice message. Click "Setup" in this section, then follow the instructions.
Note that in some regions this option is not available - possible workarounds include using one of the many services which provide free internet SMS to get the initial setup done, then switching to the Authenticator app.

Gmail - 2FA

Google's app supports most phone platforms, and is useful for securing a raft of other services too. You can switch to this once the initial setup is complete, or you can stick to SMS or voice to send codes.
Once you have logged in on a given machine for the first time, Google will offer to "trust" that machine, meaning no more codes will be required - the box is checked by default, so if you log in from an untrusted system, make sure you uncheck it.
For mail client apps and other services that don't support secondary codes, you can generate a device-specific password which replaces your standard password when logging in - see the second tab in the 2SV options page.

Gmail - 2FA

You can also provide a backup phone number, or generate a list of one-off emergency codes, to use in case of a problem with your main method of generating codes - as usual, make sure these are secure.
Google has also recently introduced its Security Key which can be plugged into your USB port and used instead of SMS or an authenticator app as your second factor of 2SV. Google's part of it is free, but you do have to pay for a compatible device. You're also restricted to Chrome when using it.

3. Check your settings

At the bottom of every page is a record of the "Last account activity", showing when you last logged on.
Last account activity

Click on "Details" to see the last ten logins, the IP address they originated from, and a guess at the country based on that IP address, which should be accurate in most cases.
It will also show whether the access was from a browser or mobile device. For many access types you can even burrow down into each entry to find info like the browser and OS version, or mobile device type. You can also find a more detailed version of the history, complete with more precise (but still estimated) location data, on the Account Settings page under "Recent activity".

Gmail - recent activity

Consider checking these from time to time to look out for access from unexpected locations, and certainly look here first if you suspect someone's been intruding into your account.
If you think anyone may have had access to your account for any period of time, it's worth checking whether any delegation has been set up. On the main Gmail page, click the gear icon and choose "Settings".

Google Gear Settings

Go to the "Accounts and import" tab and look at the "Grant access to your account" section.

Gmail Grant access

If there are any other accounts here that you haven't added, those accounts could have had unfettered access to all your mail and contacts - a sneaky intruder may also have checked the "Leave conversation unread..." box, so you wouldn't be able to tell if they'd read something. Reset any unwanted changes here as soon as you spot them.
Another place to look is on the "Filters" and "Forwarding and POP/IMAP" tabs to check no-one's set up any rules to forward mail to a third-party address. This is less intrusive than delegated access, but can still leak a lot of stuff to someone who shouldn't have it.

Filters tab

Back on the main Account Settings page (that which is reached by clicking the user ID in the top right of any Gmail page and selecting "Account") is the "Account permissions" section. You'll find it just under the Password options.

Gmail Account permissions
This lists all websites and apps which have been granted access to your Google account - these might include things like mail client apps on mobile devices, or Google's own Chrome or Drive services.
Some information should be given on what each entry means - look out for things you don't need or recognize.
Finally, it's worth looking through the list of devices trusted by the 2SV system, just to make sure any old devices are no longer exempt - look under "Registered computers" in the 2SV settings for details.
Once you've made your G mail account a bit safer, check to make sure you're following the rest of the advice in our guide to securing your web-mail.



0 comments:

Post a Comment