Rising posture: How to make your Google account more secure

Source: Internet
Author: User
Tags account security

Rising posture: How to make your Google account more secure

If you use Gmail as your main email, or rely on services provided by Google for a long time, or if you are "Google brain powder "...... This article is worth reading. This article will guide you to review and reset your Google account to improve the security of your Google account.

Although Google does not have the same sense of smell as Facebook and is constantly updating security pages, Google still has some additional security measures to enhance your personal information security, and you haven't noticed it for a long time. Don't believe it!

First, let's give a simple example. For example, Google's current built-in two-step security authentication method, a special feature provided by Google's account-allows users to instantly determine which applications and services can access their data, this increases the user's permission to determine software security.

Check which applications and services can access your data



The Google account settings page provides a very useful way to track which applications and services have accessed the data in your Google account. Maybe there are some inexplicable accesses that surprise you!

In general, Google's own applications can certainly access this data on mail clients, such as Google Drive. However, sometimes some online games associated with Google accounts can also access it!

Therefore, a page should be provided to provide the details of these game applications and the data they need to access. If it is an APP you know but it is no longer used, or worse, an APP you don't know at all, in these cases, you can decisively revoke the permission to directly access data from this page.

Make sure no one has logged on to your account



One of Google's most "reassuring" features is that we can see who has logged on to your account and where to log on-in the lower left corner of the Gmail page of a Web browser, open a window to display all the information you need.

If you are worried that you have been infiltrated by hackers or that you have stolen Device Permissions, this page is the first stop to find out the thieves-you can immediately log out of all other computer sessions, then, change your password.

For any security users who are worried about Google, you can also view the IP addresses of hackers logging on to your account-This helps track any suspicious logins (but a proxy, VPN or something is hard to track = ). The logon page also provides detailed information about the device type, length of time online, whether the device is still active, and so on. You must be aware of these features, to improve your account security, I told you today that I will not be able to fix it!

Establish two-step verification



Let's talk about Google's two-step verification. As you can see, Google's two-step verification method provides a good second anti-Black strategy, which is destined to be a favored feature option, if you log on to google from a new computer, you only need to verify step 2.

 

There are still many representative methods for Google's system security, such as providing verification code information to mobile phones? =), For example, automatic calling, or using a dedicated USB key to provide bank-level security!

Make sure that you do not use Google + too much

First of all, Google + pages may not belong to your main social network, but Google has made it a node that anyone in the world can find your resources, so it is also worth reexamining your personal data to make sure that you are presented to the world with a chic/beautiful look.

Therefore, it is worth your control over which Google + users can contact you. If you lock your "circle of friends" instead of the default value for letting yourself flow, you will be less disturbed by spam and bad network elements.

Manage your Google store

Google relies on Google's adwords to serve users as advertising targets for profit. Text Ads may appear on the search engine, or advertisements may appear in Gmail emails sent to users. This information is generally obtained from Google's search for YouTube.

You can use your google dashboard settings to determine which google service information can be stored and which cannot be stored.

There are also some key management location information services that can store a detailed historical data, such as where you have used Android devices, history of your Chrome browser (this is a separate web browsing history, which will automatically run records on any device you open and log on to Chrome ).
‍‍Fortunately, Google itself provides a clear explanation of how software works and other issues. users who do not want to be tracked by the Internet can pay attention to Google's Tools list page.‍‍

So far this analysis of Google Security

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.