Google was founded in 1998 in the garage of Susan Wojcicki (current YouTube CEO) and since then it has not stopped growing and encompassing territory on the Internet. Today the company is worth hundreds of millions of dollars and it is among the most important in the world.
One of the reasons for its considerable value is that it groups together many other platforms and applications. Which share among other things a unique user and password. That is, with a single credential you can access different services.
Therefore, it is vitally important to preserve the security of our login data. With this in mind, we recommend that you read this entry and thus keep your Google account safe.
What are the main risks of our Google account being hacked?
- Maps. With this tool you can the location of our house, workplace, visited places and traveled paths.
- Chrome. Bookmarks, favorite pages, saved passwords and other forms.
- Youtube. I could enter the personal videos, even those that are in private or have not been published.
- Google Photos. All photographs found in the phone gallery can be viewed from this application.
- Contacts. You will have access to all the people registered in the mobile. Taking into account that the SIM card is no longer used as a storage place for them, it would mean all the contacts.
- Calendar. If you actively use this tool, the hacker might know what your next activities.
- Drive. The files stored in the Google cloud will be available to the criminal.
- Android. If it's an expert, it could take control of your phone. Calls, messages, microphone and even cameras can be used for him.
- Gmail. One of the most serious problems if we use this platform as the main email. This means that thanks to the "password recovery" tools offered by many sites, you could access them. I mean, I would have access to Facebook, Instagram, other emails, accounts Credit cards (although they usually use additional security systems), and many others.
Steps to protect your Google account and avoid being the victim of an account hack or theft
Put a strong password
Forget about using your birthday or 123456! A strong password, Must contain words, numbers, symbols and toggle between upper and lower case. It may seem difficult to remember later, but try two memorable words, with numbers in between. For example, something you have in front of your computer: "Monitor963.Teclado"
Activate screen lock
Remember to always have this option activated, on your mobile as on the computer it is that you share it with other people. Be sure to minimize the time the screen stays active.
The least secure ways to lock are swipe screen and pattern. If your smartphone has a fingerprint reader or an iris scanner, use it. A password can also work, as long as it is strong.
Synchronize the account with the mobile
If someone unauthorized tries or accesses your account, for example, by email, you will find out immediately. And you can react and even block the attack with the warning options. If this has happened to you, we recommend that you update your password and add more security barriers.
Activate two-step verification
If you are one of those who use the same pass In all the places where you register, or usually download programs from the Internet, it is extremely important that you activate this. With this method, the system will communicate with you via mobile, every time you access your account from another device. Said message will contain a second password. It also allows the use of digital security keys.
To activate this tool:
- Go to your account (at the top of the Google home page).
- In your profile picture, select "Manage your Google account".
- In the section of "Sign in to Google" active "Two-step verification".
- In the new window, choose "Start".
- Enter your current password.
- Indicate which mobile device you are using.
- Press "Try it now".
- Google will send a test notification to your smartphone.
- Confirm your phone number and the way you will receive the code.
Use phone to login
There is an option that allows access to Google applications through mobile. With this method, you can skip entering the password. That is, every time you try to enter your account, the system will send you a notification. To which you must respond "Yes" in case you're the one trying. AND "No" otherwise.
To activate this option:
- Enter the Google account management, as we saw in the previous section.
- Login to "Use phone to log in."
- Enter your password and indicate which paired device you will use.
- To finish, the system will make a small test as a demonstration. If the notification reaches your phone successfully press "Yes" and you will have this new security barrier.
Protect your computer against keyloggers and malwares
You can find the best methods to protect yourself from these attacks in Internet Step by Step.
But we can say that the indicated way to avoid or repel these malicious softwares is to have a powerful antivirus. If it is within your possibilities, the paid ones offer great tools. However, there are others that are free and have basic but sufficient weapons to eliminate these threats. The most important thing is to keep them updated and not create exceptions that could harm our equipment and security.
Keep the browser updated
There is no perfect browser. Failures can occur on any system. That is why the developer companies update the versions of these programs. These imperfections can weaken the security of each of them, allowing the risk of entry of some malware.
Luckily, the main web browsing companies have equipment that review and correct codes for faults. If you have disabled the automatic update option, your data and equipment may be at risk.
Activate security alerts
They are the notifications that reach your mailbox and mobile device when someone tries to access your account. In the event that that person is you, it will be nothing more than a simple warning. But in the case of a criminal, this can make a big difference. Knowing in real time the activity of your account you can act more effectively to take appropriate action.
Delete unused browser extensions
It is true that since extensions exist, if we need a tool it is not necessary to download the programs to the computer. It is also true that some of us use them for a short time and then they are forgotten in the navigation bar.
These extensions they need permissions and access to certain data in order to function correctly. The problem is that if you are dealing with an unreliable developer these tools can be sold to third parties at great risk. Above all, because it is difficult for antivirus to detect such threats. If you do not want to take risks with your browser, read below.
Do not install extensions from unreliable sources
The most important thing is not to do it from anywhere other than the Chrome web store. Never install extensions from other sites.
Second, we must pay attention to the data it offers about its developer. Inside the mentioned store we can see the age of the extension. It is less likely than one that has been present for many years with certain risks. Make sure they contain real data of the team that created it.
To continue, we must read the privacy policies. Terms like Track, "data", "Sell" they may be alarm signals. At the same time, you must comply with the permissions requested at the time of installation. These must match the function of that tool. That is, if it is a screen grabber, you should not try to access read and modify data from the visited websites.
To finish, read the comments. Lean on the experience of other users on each extension. This will give you a better picture to decide whether to install it or not.