Skip to main content

How To Secure own G-mail Account


Step 1. 

Always access Gmail directly by going to https://mail.google.com. If you are on your mobile device, go to https://m.gmail.com.  

Gmail now uses a secure HTTPS connection by default. This means that email is encrypted as it travels between a user’s browser and Google’s servers.

Step 2. 

Read up about Gmail’s privacy and security. Familiarize yourself with Google’s policies and the protections they offer. Visit Gmail’s Security Center and complete the Gmail security checklist to make sure your account is secure.

Step 3. 

Never give out your password to anyone. Remember that Gmail will never ask for your username or password, so if you get such a request, it’s bogus. 

Step 4. 

Do you use any Gmail-related plugins or extensions? Google can't guarantee the security of these third party services, so be careful when using them or avoid downloading extensions all together. 

Step 5. 

That said, there is an extension available for signing and encrypting Gmail messages. The Gmail S/MIME extension for the Firefox browser allows you to send and receive signed and encrypted messages in Gmail. S/MIME stands for Secure/Multipurpose Internet Mail Extensions.
Gmail S/MIME adds a lock icon to the Gmail compose and reply screens. Initially this lock will be shown unlocked. After you enter the recipient's email address, the lock will change to the locked state if there is an entry for that user in the Firefox certificate database. Learn more here.

Step 6. 

Make sure to regularly update both your operating system and your browser(s) to fix bugs and add security updates. 

Step 7. 

Use a strong passphrase and change it frequently. Unlike a password, a passphrase is usually longer (at least 20 characters) and much harder to break. Make sure this passphrase is unique to Gmail; don’t use the same passphrase on different sites. See our how to guide to learn more about creating strong passwords and passphrases.

Step 8. 

Update your account recovery options. In the event that you forget your password, you can set up options to recover it. 
Log into your account at https://www.google.com/accounts and click Recovering your password under Personal Settings. You can add a recovery email address--another email account you use that Google can send alerts to if you lose access to your account--and your mobile number so an SMS with a recovery code can be sent to you.

Step 9. 

Check what third-party websites are authorized to access your Google account data
Log into your account at https://www.google.com/accounts and click the My Account link at the top right of the page. Click Authorizing applications & sites to see a list of all third-party sites you've granted access to. Click the Revoke Access link to disable access for a particular site.

Step 10.

For email attachments, select “View as HTML” rather than “Download.” The contents of the attachment will then appear in a new browser window rather than being downloaded to your computer. Excel file attachments can also be opened in Google Spreadsheets and Word, PowerPoint, and Adobe PDF files can be viewed in Google Docs Viewer. 

Step 11.

If you do need to download an email attachment, make sure you have an anti-virus software installed and updated. Run the software against any email attachment that you want to download. 

Step 12.

Each time you log into Gmail, check the details about the last time your account was accessed. Scroll to the bottom of your Gmail page and you’ll see: "Last account activity: X hours ago on this computer. Details." Click on the "Details" link. 
You will then see the IP addresses of the computers that have recently accessed your accounts. Anything look fishy? Do you see any unusual IPs that are not yours? Does it appear that someone else may have accessed your Gmail account?

Step 13. 

Clear your cache and cookies regularly, especially if you are using a public computer. 
Each time you access a file through your web browser, the browser caches or stores it. This makes it easier for the browser to retrieve data while you are surfing the web. A cookie is a file created by a web browser that is stored on a computer and is used for a number of reasons from authentication to shopping cart contents. 
How you clear your cache and cookies depends on the type of browser you use. Learn how here

Step 14. 

Finally, always always always sign out after you’ve finished your session, especially if you are using a public computer. 

Comments

Popular posts from this blog

How to Learn free Ethical Hacking Tutorial 1 :- Introduction 1

Welcome to  Hackers !!! Today, I am going to start a series on  Ethical Hacking Tutorials  to spread awareness.  This series of Ethical Hacking Tutorial is for Educational purpose only, any wrong and illegal activity is not promoted by me or my team of Dark Street Hackers.  In this first tutorial, we will be looking at what is cyber security, why we need it, who are the hackers and much more. So, without wasting time, let's get started with it. What is Cyber Security? Cybersecurity is the act of securing frameworks, systems, and projects from advanced assaults. These cyberattacks are typically initiated for changing, or crushing touchy data; blackmailing cash from clients; or intruding on ordinary business forms. In simple words, I can say, it is a process of making digital data secure using various tools and techniques before an attacker or bad guy tries to access it. Why we need Cyber security? Nowadays, everything is online and lots data is being saved in the di

Best Books