Get Started Today!  (415) 295-4898

croom new

415 IT Blog

How to Make Your Google Account More Secure

How to Make Your Google Account More Secure

Going through your passwords and updating them every so often is a very wise habit to get into, particularly when they are used to protect a lot of data—as the password to your Google account often is. Considering this, let’s go over how to update your Google password and otherwise lock down your account.

How Much is Tied to a Google Account?

For many, their Google account is linked to quite a few frequently-used utilities and applications. Going far beyond the search engine functionality it began as, Google’s services now involve multiple programs and solutions. As such, the potential danger of a cybercriminal accessing your Google account is increased greatly.

For instance, a Google account is now linked to:

  • Google.com (for custom tailored search results)
  • Gmail
  • Google Drive
  • Google Docs/Sheets
  • Google Maps
  • Android
  • Google Workspace
  • Google Chrome
  • YouTube

 … with many, many other accounts and services also tied to Google. A good rule of thumb: anything with “Android,” “Chrome,” or of course “Google” in the name is likely tied to your Google account.

Updating Your Google Password

Fortunately, Google makes it exceptionally simple to update the password to your account:

  1. Visit https://accounts.google.com/. If you aren’t signed in already, log in with your email/phone number and password.
  2. Click Security on the left-hand side.
  3. Look for Signing in to Google. Click Password.
  4. Google will usually prompt you to provide your current password, and then have you input a new password.

A WORD OF WARNING: Naturally, with so much tied to a single password, you need to make sure it is as secure as you can possibly make it. Use a totally unique password—not one that provides you with access to any other account. Don’t include any personally identifiable information that others might associate with you, like your birth date, maiden name, social security number, phone number, or the like.

To help accomplish this, it will help to use a password manager to keep track of them all, along with any built-in password creation features it has built in, as this will help you to generate a secure, randomized password with sufficient complexity. You could also string a few random and unrelated words together to make a passphrase, sprinkling in numbers and symbols as you see fit to help make a memorable but significantly more secure option.

Once you make these changes, you’ll probably need to re-log into your Google account on a few devices.

But Wait, There’s More!

To really protect your Google account, let’s go a little further and set up 2-Step Verification (also commonly known as Two-Factor Authentication) if you have not yet done so. 2-Step Verification is a great insurance policy against the possibility that your password is breached.

Once your password is changed, from your Google Account page:

  1. Click the Security option on the left-hand side of the page.
  2. Click 2-Step Verification.
  3. Google may prompt you to enter in your password again, just to make sure it’s you.
  4. Depending on what Google already knows about you, this might go a few different ways—you’ll either be prompted to set up a phone number to get a text message or phone call, or Google might walk you through setting this up on your smartphone. Either way, follow the on-screen instructions. 

Your various authentication options come at varying levels of simplicity and efficacy. Most convenient is the use of a Google prompt, which sends a notification to your Android device whenever a new device is attempting to log into your account that allows you to permit or disallow permission to do so. Receiving a text message with a code is undoubtedly convenient, but less secure as these text messages can potentially be intercepted. The most secure option is to utilize Google’s Authenticator app, which is also simple to set up.

If your business uses Google’s solutions to power your business, 415 IT recommends that you implement these changes. Need help? Give our team a call at (415) 295-4898.

Be Sure to Update Your Microsoft Passwords
What 5G Means for the Internet of Things
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Internet Data Recovery Software Email Managed IT Services Business Mobile Device Google Phishing Small Business Malware Collaboration User Tips Outsourced IT Innovation Cloud Computing Hackers Cybersecurity Smartphone Hardware Business Management Tech Term Upgrade Communication Managed Service Microsoft Mobile Devices Computer Android Workplace Tips Business Continuity Windows 10 VoIp Covid-19 Smartphones Backup Quick Tips Disaster Recovery Ransomware Paperless Office Managed Service Provider Communications Network Remote Work Encryption Users Server Saving Money Office 365 Business Technology Passwords Data Management Wi-Fi Browser BDR Social Media Artificial Intelligence Internet of Things Remote Monitoring Managed IT Help Desk Government Document Management Compliance Windows 7 Vulnerability Save Money Holiday Healthcare Windows Data Security Facebook Automation Applications Blockchain Scam Managed IT services Miscellaneous Laptops Chrome Microsoft Office Antivirus Bandwidth Office Project Management Virtualization Two-factor Authentication Wireless Redundancy Mobile Office Processor Tip of the week Health Employer-Employee Relationship Information Remote Vendor Management Gadgets Avoiding Downtime Analytics Information Technology Company Culture Training OneDrive Managed Services IoT Regulations BYOD Employee-Employer Relationship Hard Drive Data Loss Apps Router Storage Maintenance Infrastructure Mobility Software as a Service Net Neutrality VPN Networking RMM Machine Learning IT Management Proactive Meetings Website Files Access Control Virtual Private Network Customer Relationship Management Network Management Remote Monitoring and Management Financial Consultation Operating System Professional Services Word Mobile Security Flexibility Data Storage Unified Communications Employees Patch Management Data Breach Electronic Health Records Instant Messaging Consulting Downtime Management Time Management File Sharing Social Network Vendor WiFi The Internet of Things Gmail Spam Risk Management Cooperation Managed Services Provider Alert Unified Threat Management Remote Workers Password Money HIPAA Utility Computing Bring Your Own Device Holidays Co-Managed IT Tablet Remote Computing Server Management Search Internet Exlporer File Management Dark Web Augmented Reality Smart Technology Assessment Computing Monitoring Recycling Payment Cards Display Remote Worker Cybercrime Samsung Cyber security PCI DSS Authorization Connectivity Teamwork Business Telephone IT Consulting Firewall Features Politics Cookies Cables Return on Investment Virtual Machines Comparison Licensing Migration eWaste Options Telephone Remote Working SharePoint SaaS Vulnerabilities Superfish Reviews Technology Tips How To Test Mail Merge Biometric User Error Data Warehousing Private Cloud Database Management Touchscreen Hacking Legislation WPA3 Shared resources Going Green IT Assessment Distributed Denial of Service Procurement Managing Stress Nanotechnology Wires Settings Personal Information Credit Cards Specifications Chatbots 5G Mobile VoIP Budget Downloads Bookmarks ROI Mobile Computing Virtual Assistant Bitcoin End of Support Digital Payment Hotspot Mirgation Manufacturing Address Gamification Heating/Cooling Operations GDPR CRM Trending Fleet Tracking Zero-Day Threat Wearable Technology Star Wars Batteries Digitize Managed IT Service Cyberattacks Social Enterprise Content Management Statistics Customer Service App Transportation Active Directory Computers Techology Black Friday Mobile Device Management Identity Theft Enterprise Resource Planning Wireless Internet Big Data Favorites Geography Wasting Time Current Events Windows Server 2008 Gifts Mouse Language Cache Smart Devices Servers Content Filtering Asset Tracking Backup and Disaster Recovery CIO applications Shadow IT Technology Laws Break Fix Read Only Security Cameras Social Networking Emergency Apple Multi-Factor Security Bluetooth Permissions MSP Finance Screen Reader Outlook Windows Server Disaster Resistance Recovery Cyber Monday Staff Point of Sale Tech Terms Identity Employer/Employee Relationships Conferencing Modem High-Speed Internet Database Hacker Computing Infrastructure Hard Disk Drives Sensors Outsource IT Printer Microsoft Excel Notes Human Error Tech Support Outsourcing Unified Threat Management Printing G Suite Proactive Maintenance Solid State Drive Peripheral Google Calendar Fraud Authentication Smart Tech Shortcut User Management IT Proactive IT E-Commerce Theft Mobile Development Voice over Internet Protocol Projects Optimization Alerts Electronic Medical Records Solid State Drives Laptop Websites PowerPoint Lenovo Banking Travel OneNote Permission IT Technicians Cost Management Value of Managed Services Video Conferencing Virtual Reality Motherboard Chromebook Twitter Regulation Education CEO Marketing Printers Students CES Daniel Stevens

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...