{"id":2020,"date":"2021-02-24T20:41:17","date_gmt":"2021-02-24T15:11:17","guid":{"rendered":"https:\/\/www.wikitechupdates.com\/?p=2020"},"modified":"2021-02-24T20:41:17","modified_gmt":"2021-02-24T15:11:17","slug":"simple-tips-to-protect-your-gmail-account","status":"publish","type":"post","link":"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/","title":{"rendered":"Simple Tips to Protect Your Gmail Account"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Mail stores a lot of personal information, including bank payments, business correspondence, information about recent bonuses received at\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/playamoapp.com\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">PlayAmo Casino App<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0and more. If a scammer hacks it, he can easily log in to most sites and even apply for an online loan.\u00a0<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655deab1368da\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655deab1368da\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/#Use_a_Complex_Password\" title=\"Use a Complex Password\u00a0\">Use a Complex Password\u00a0<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/#Turn_on_Two-Step_Authentication\" title=\"Turn on Two-Step Authentication\">Turn on Two-Step Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/#Check_the_Backup_Recovery_Methods\" title=\"Check the Backup Recovery Methods\">Check the Backup Recovery Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/#Check_Your_Accounts_Last_Activity\" title=\"Check Your Account&#8217;s Last Activity\">Check Your Account&#8217;s Last Activity<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Use_a_Complex_Password\"><\/span><span data-preserver-spaces=\"true\">Use a Complex Password\u00a0<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">This is a trivial, but the most effective tip. Most likely you have repeated passwords on different accounts. If so, don&#8217;t do that anymore. This is the best present for a cybercriminal because he&#8217;ll get to all the others if he hacks one account.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Think of a unique password for all important accounts and write it down on a piece of paper. Information security experts used to advise against this, but times have changed. The chances of data leaks from popular password managers are increasing every day. Against this backdrop, the situation where a hacker breaks into an apartment and rips stickers off the fridge is negligible.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Turn_on_Two-Step_Authentication\"><\/span><span data-preserver-spaces=\"true\">Turn on Two-Step Authentication<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Two-step authentication is another way to protect your data. It works like this: when you try to log in, the system asks not only for the password, but also for a secret code. That&#8217;s how the service verifies that the account owner is requesting access, and not a fraudster.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">To turn on two-step authentication in Gmail, select Manage Google Account &#8211; Security &#8211; Sign in to your Google Account &#8211; Two-step authentication.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">By default, the code comes in SMS, but you can choose push notifications or an electronic key. If with the first two everything is clear, then about the last method we need to tell more about.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A security key is a small device, similar to a flash drive. It serves as the user&#8217;s identifier and is of two types: Bluetooth and <a href=\"https:\/\/en.wikipedia.org\/wiki\/USB\" target=\"_blank\" rel=\"noopener\">USB<\/a>. During the authorization of the account on the key you need to press a button or insert it into the system unit.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Each method has its pros and cons, but we recommend stopping at push notifications, since the key can get lost and the sim is not so difficult to hack.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: right;\"><strong>Also Read<\/strong>: <a href=\"https:\/\/www.wikitechupdates.com\/advantages-of-using-gmail-for-business\/\" target=\"_blank\" rel=\"noopener\">Advantages of Using Gmail for Your Business Email<\/a><\/p>\n<\/blockquote>\n<h2><span class=\"ez-toc-section\" id=\"Check_the_Backup_Recovery_Methods\"><\/span><span data-preserver-spaces=\"true\">Check the Backup Recovery Methods<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Very often it happens that when registering, the user indicates the mail or phone, and then loses access to it. It&#8217;s important to keep this information up to date, since the service sends a password reset request to them when you try to recover your account.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Go to Google Account Management &#8211; Security &#8211; Identity Verification Ways and update your contact information if it&#8217;s out of date.<\/span><\/p>\n<blockquote>\n<p style=\"text-align: right;\"><strong>Also Read<\/strong>: <a href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/\" target=\"_blank\" rel=\"noopener\">How to detect fraudulent emails<\/a><\/p>\n<\/blockquote>\n<h2><span class=\"ez-toc-section\" id=\"Check_Your_Accounts_Last_Activity\"><\/span><span data-preserver-spaces=\"true\">Check Your Account&#8217;s Last Activity<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">It may be that a hacker has already gained access to your account, in which case it is important to change your password as soon as possible.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Select Google Account Management, then go to Security and look for the &#8220;Your Devices&#8221; tab. Click &#8220;Manage Devices&#8221; to see when and from which device the login was made.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">After all, the security of sensitive data is of paramount importance, especially when the mass use of a variety of computer devices has reached existing limits. So, protect your Gmail to safe your personal data.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mail stores a lot of personal information, including bank payments, business correspondence, information about recent<\/p>\n","protected":false},"author":1,"featured_media":2021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[29,22],"tags":[3465,3458,3455,3450,3467,3445,3464,3460,3451,3453,3454,3457,3459,3463,3447,3452,3466,3461,3446,3449,3468,3462,3448,3456],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":676,"url":"https:\/\/www.wikitechupdates.com\/advantages-of-using-gmail-for-business\/","url_meta":{"origin":2020,"position":0},"title":"Advantages of Using Gmail for Your Business Email","author":"Admin","date":"15 April 2020","format":false,"excerpt":"Gmail is one of the email platforms preferred by users due to its simplicity and security. A platform that helps us save time and presents us with a whole series of possibilities from your inbox. Gmail has a series of advantages such as speed in sending photos, movies or documents.\u2026","rel":"","context":"In &quot;Apps&quot;","block_context":{"text":"Apps","link":"https:\/\/www.wikitechupdates.com\/category\/apps\/"},"img":{"alt_text":"Gmail for business","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Gmail.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Gmail.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Gmail.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Gmail.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Gmail.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1501,"url":"https:\/\/www.wikitechupdates.com\/what-is-the-best-cloud-service\/","url_meta":{"origin":2020,"position":1},"title":"what is the best cloud service? Google Drive, Dropbox, Onedrive and Amazon Drive","author":"Admin","date":"13 June 2020","format":false,"excerpt":"All storage services (cloud service) offer free space to back up important files, but those who want more storage should use a monthly subscription. To help you make a better choice, here is a comparison of the Google Drive, Dropbox OneDrive and Amazon Drive offers. The best cloud services There\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.wikitechupdates.com\/category\/technology\/"},"img":{"alt_text":"types of cloud service","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/cloud-storage-types.jpeg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/cloud-storage-types.jpeg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/cloud-storage-types.jpeg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/cloud-storage-types.jpeg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/cloud-storage-types.jpeg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":703,"url":"https:\/\/www.wikitechupdates.com\/has-your-password-been-stolen-heres-how-to-find-out\/","url_meta":{"origin":2020,"position":2},"title":"Has Your Password Been Stolen? Here&#8217;s How To Find Out","author":"Admin","date":"17 April 2020","format":false,"excerpt":"One of the main fears that all Internet users have is that they will steal our passwords. Hackers use various techniques to take control of the services we use, social networks or email. Once they have entered they can do everything they want, from taking control of our identity to\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.wikitechupdates.com\/category\/technology\/"},"img":{"alt_text":"Has Your Password Been Stolen?","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Password-Been-Stolen.jpg?fit=1200%2C799&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Password-Been-Stolen.jpg?fit=1200%2C799&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Password-Been-Stolen.jpg?fit=1200%2C799&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Password-Been-Stolen.jpg?fit=1200%2C799&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/Password-Been-Stolen.jpg?fit=1200%2C799&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1235,"url":"https:\/\/www.wikitechupdates.com\/what-is-blockchain-technology-and-how-does-it-work\/","url_meta":{"origin":2020,"position":3},"title":"What Is Blockchain Technology and How Does It Work","author":"Admin","date":"3 June 2020","format":false,"excerpt":"At its core, the blockchain is a distributed ledger. But what does that mean? And how is it different from a centralized ledger? What exactly is a blockchain? We will explain it by comparing a blockchain with a bank. Your bank maintains a central database, that is, a \"ledger\", of\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.wikitechupdates.com\/category\/technology\/"},"img":{"alt_text":"Blockchain And Bitcoin","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Blockchain-And-Bitcoin.png?fit=1000%2C667&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Blockchain-And-Bitcoin.png?fit=1000%2C667&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Blockchain-And-Bitcoin.png?fit=1000%2C667&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/Blockchain-And-Bitcoin.png?fit=1000%2C667&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":822,"url":"https:\/\/www.wikitechupdates.com\/what-is-a-vpn-and-why-would-i-need-one\/","url_meta":{"origin":2020,"position":4},"title":"What Is a VPN, and Why Would I Need One?","author":"Admin","date":"25 April 2020","format":false,"excerpt":"Virtual private networks (VPN) help users protect their privacy when browsing and accessing services and web pages when we use unreliable connections such as public Wi-Fi networks since it protects the information we exchange through encryption. When we surf the Internet, our team connects to another, and information is exchanged\u2026","rel":"","context":"In &quot;Entertainment&quot;","block_context":{"text":"Entertainment","link":"https:\/\/www.wikitechupdates.com\/category\/entertainment\/"},"img":{"alt_text":"vpn","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/vpn.jpg?fit=1200%2C750&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/vpn.jpg?fit=1200%2C750&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/vpn.jpg?fit=1200%2C750&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/vpn.jpg?fit=1200%2C750&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/04\/vpn.jpg?fit=1200%2C750&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1122,"url":"https:\/\/www.wikitechupdates.com\/how-to-recover-the-icloud-account-if-i-forgot-my-username-or-password\/","url_meta":{"origin":2020,"position":5},"title":"How to Recover the iCloud Account if I forgot my Username or Password?","author":"Admin","date":"20 May 2020","format":false,"excerpt":"One of the main advantages of the Apple operating system is that it has a great security system for its users. To do this, request an Apple ID username and password which you will use to perform almost all the functions of your device, whether it is to log into\u2026","rel":"","context":"In &quot;iOS&quot;","block_context":{"text":"iOS","link":"https:\/\/www.wikitechupdates.com\/category\/ios\/"},"img":{"alt_text":"how to recover apple id password","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/how-to-recover-apple-id-password.jpg?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/how-to-recover-apple-id-password.jpg?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/how-to-recover-apple-id-password.jpg?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/how-to-recover-apple-id-password.jpg?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/how-to-recover-apple-id-password.jpg?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/2020"}],"collection":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/comments?post=2020"}],"version-history":[{"count":1,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/2020\/revisions"}],"predecessor-version":[{"id":2022,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/2020\/revisions\/2022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media\/2021"}],"wp:attachment":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media?parent=2020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/categories?post=2020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/tags?post=2020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}