Archives - Security Best Practice


Pay attention to Google cross-app account alerts

Beginning in 2020, Google began to provide alerts about potential Google Account security issues to users regardless of which Google app (Gmail, YouTube, Drive, etc.) they were using. Look for a small icon, with an exclamation mark next to your profile image, in the upper right corner of most apps. Tapping/clicking through will display the […]

Take the Google Security Checkup

The Security Checkup offered by Google is a step-by-step guide for making sure your account is secure and recoverable in case it’s attacked. Open your account page, then select the Security tab. At the top, you’ll see a message that says “We keep your account protected.” Click “Get started” and follow the on-screen instructions. If […]

Fib the answers to your security questions

If you’re tired of trying to remember who you said your favorite actor was or whether you should use the abbreviation or spell out “Street” for the address of your first home, here’s some good news: It’s better to make up the information for your security questions anyway. This will make it easier to remember […]

Add a second email address for Google account recovery

For many people, their Gmail account is the only personal email address they use. However, if your lose access to your Google account or it becomes compromised, selecting a secondary email address can help you recover the account. From your Google account page, open the Security tab. Then, scroll down to the section that says […]

Be cautious with signing into apps with social network accounts

Some apps are integrated with social network sites—in these cases, the app can collect information from your social network account and vice versa. Ensure you are comfortable with this type of information sharing before you sign into an app via your social network account. Alternatively, use your email address and a unique password to sign […]

Use Google’s Inactive Account Manager to make a legacy plan

Dormant Google accounts can contain a treasure trove of information. It could be valuable to cybercriminals or provide crucial information that you want to share with your loved ones. To ensure that your data is protected once you are no longer able to access it, use Inactive Account Manager. From the main page of your […]