{"id":17826,"date":"2020-02-26T04:30:19","date_gmt":"2020-02-26T12:30:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11559\/"},"modified":"2020-02-26T04:30:19","modified_gmt":"2020-02-26T12:30:19","slug":"news-11559","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/26\/news-11559\/","title":{"rendered":"10 steps to smarter Google account security"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/google-account-security-100832892-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Wed, 26 Feb 2020 03:00:00 -0800<\/strong><\/p>\n<p>There are important accounts to secure, and then there are <em>important<\/em> accounts to secure. Your Google account falls into that second category, maybe even with a couple of asterisks and some neon orange highlighting added in for good measure.<\/p>\n<p>I mean, really: When you stop and think about how much stuff is associated with that single sign-in \u2014 your email, your documents, your photos, your files, your search history, maybe even your contacts, text messages, and location history, if you use Android \u2014 saying it&#8217;s a &#8220;sensitive account&#8221; seems like an understatement. Whether you&#8217;re using Google for business, personal purposes, or some combination of the two, you want to do everything you possibly can to keep all of that information locked down and completely under your control.<\/p>\n<p>And guess what? Having a password that you hastily set seven years ago isn&#8217;t enough. With something as priceless as your personal data, that single key is only the start of a smart security setup. And even <em>it<\/em> might be due for an upgrade.<\/p>\n<p>Take 10 minutes to go through these steps, then rest easy knowing your Google account is as guarded as can be.<\/p>\n<p>We&#8217;ll start with something simple but supremely important \u2014 that aforementioned Google account password. Consider the following questions:<\/p>\n<p>If the answer to any of those questions is yes, first, bop yourself firmly on the nose. Then <a href=\"https:\/\/myaccount.google.com\/signinoptions\/password\" rel=\"noopener nofollow\" target=\"_blank\">use this link<\/a> to go change your password immediately \u2014 preferably to something long, complex, and not involving any easily discoverable personal info, any common words or patterns, or <em>anything<\/em> you use anywhere else.<\/p>\n<p>Got it? Good. Next:<\/p>\n<p>No matter how strong your Google account password is, there&#8217;s always still the chance someone could crack it \u2014 but you can exponentially reduce the risk of anyone actually getting into your virtual property by enabling two-factor authentication on your account.<\/p>\n<p>With two-factor authentication, you&#8217;ll be prompted for a <em>second<\/em> form of security in addition to your password \u2014 ideally something that requires a physical object that&#8217;d only ever be in your presence. In its simplest effective form, that could be a prompt or a code generated by your phone. If you want to get really fancy, it could be a button pressed on an actual key you carry (which could be a special <a href=\"https:\/\/support.google.com\/accounts\/answer\/6103523?co=GENIE.Platform%3DAndroid&amp;hl=en\" rel=\"noopener nofollow\" target=\"_blank\">USB- or Bluetooth-based dongle<\/a> or even <a href=\"https:\/\/support.google.com\/accounts\/answer\/9289445?co=GENIE.Platform%3DAndroid&amp;oco=0\" rel=\"noopener nofollow\" target=\"_blank\">something built into your phone<\/a>). There&#8217;s also an option to have codes sent to you via text message, but that method is <a href=\"https:\/\/www.theverge.com\/2017\/9\/18\/16328172\/sms-two-factor-authentication-hack-password-bitcoin\" rel=\"noopener nofollow\" target=\"_blank\">relatively easy to hijack<\/a> and thus not generally advisable to use.<\/p>\n<p>Whatever path you choose, having that second layer in place will make it incredibly difficult for anyone to get into your Google account, even if they <em>do<\/em> somehow know your password.<\/p>\n<p>Two-factor authentication makes it significantly more difficult for anyone to get into your Google account.<\/p>\n<p>If you don&#8217;t have it set up yet, go to <a href=\"https:\/\/www.google.com\/landing\/2step\/\" rel=\"noopener nofollow\" target=\"_blank\">Google&#8217;s 2-Step Verification page<\/a> to get started.<\/p>\n<p>If Google ever detects some sort of suspicious activity on your account, it might require you to verify your identity before it lets you sign in. And if you haven&#8217;t looked at your account verification settings in a while (or ever, for that matter), there&#8217;s a decent chance the necessary info might be out of date or missing altogether.<\/p>\n<p>Take a minute now to open up <a href=\"https:\/\/myaccount.google.com\/security\" rel=\"noopener nofollow\" target=\"_blank\">Google&#8217;s account security site<\/a> and look in the section labeled &#8220;Ways we can verify it&#8217;s you.&#8221; There, you should see two options:<\/p>\n<p>If the value next to either option is <em>not<\/em> current and correct, click it and update it immediately.<\/p>\n<p>And with that, we&#8217;re ready to move on to our next level of Google account protection.<\/p>\n<p>When you set up an app that interacts with Google in some way \u2014 on your phone, on your computer, or even within a Google service such as Gmail or Docs \u2014 that app gets granted a certain level of access to your Google account data.<\/p>\n<p>Depending on the situation, that could mean it&#8217;s able to see some of your activity within specific Google services; it could mean it&#8217;s able to see everything in your Gmail, Google Calendar, or Google Drive; or it could mean it&#8217;s able to see <em>everything<\/em> across your <em>entire<\/em> Google account.<\/p>\n<p>It&#8217;s all too easy to click through confirmation boxes without giving it careful thought \u2014 so look back now and see exactly what apps have access to what types of information. Visit <a href=\"https:\/\/myaccount.google.com\/permissions\" rel=\"noopener nofollow\" target=\"_blank\">Google&#8217;s third-party app access overview<\/a> and look through the list of connected services. If you see anything there you no longer use or don&#8217;t recognize, click its line and then click the button to remove it.<\/p>\n<p>Review your third-party app list and remove any items that no longer need access to your Google account.<\/p>\n<p>Allowing apps you know and trust to access your account is perfectly fine, but you want to be sure to revisit the list regularly and keep it as current and concise as possible.<\/p>\n<p>In addition to apps, you&#8217;ve almost certainly signed into your Google account on a variety of physical devices over the past several months (and beyond). And often, once you&#8217;ve signed in at the system level, a device remains connected to your account and able to access it \u2014 no matter how long it&#8217;s been since you&#8217;ve actually used the thing.<\/p>\n<p>You can close that loop and take back control by going to <a href=\"https:\/\/myaccount.google.com\/device-activity\" rel=\"noopener nofollow\" target=\"_blank\">Google&#8217;s device activity page<\/a>. If you see any device there that you no longer use or don&#8217;t recognize, click the three-dot menu icon within its box and sign it out of your account right then and there.<\/p>\n<p>Another important app-related consideration: If you&#8217;re using Android, some system-level permissions \u2014 such as those connected to your contacts and calendar \u2014 can effectively control access to areas of your Google account data, since services such as Google Contacts and Google Calendar sync that data between your phone and the cloud.<\/p>\n<p>Head into the Privacy section of your phone&#8217;s system settings and look for the line labeled &#8220;Permission manager&#8221; (or something along those lines; the exact phrasing and presentation may vary from one <a href=\"https:\/\/www.computerworld.com\/article\/3235946\/android-versions-a-living-history-from-1-0-to-today.html\">Android version<\/a> and device-maker to the next). There, you can look through each type of permission and see which apps are authorized to access it \u2014 and, with a couple more taps, revoke the permission from any apps where that level of access doesn&#8217;t seem necessary.<\/p>\n<p>Android makes it easy to review and adjust an app&#8217;s permission, if you know where to look.<\/p>\n<p>On the desktop, extensions added into Chrome have the potential to expand your browser&#8217;s capabilities \u2014 but they also have the potential to put your privacy at risk.<\/p>\n<p>Up until late 2018, y&#8217;see, Chrome desktop extensions that needed to view any part of your online activity were forced to request a blanket permission to read and change data on every website you visit. That means an extension that does something as simple as <a href=\"https:\/\/www.computerworld.com\/article\/3387139\/gmail-redesigned.html\">enhancing the Gmail interface<\/a> or allowing you to save articles for later would invariably have access to <em>everything<\/em> you do in your browser \u2014 despite the fact that such programs actually only need access on a limited level (either to the Gmail website, in the first case, or only when you click the icon to activate the extension, in the second).<\/p>\n<p>At this point, Google allows extensions to request browsing data access on a more sensible, nuanced basis \u2014 but it&#8217;s a slow-moving transition, and plenty of extensions still stick with the old all-or-nothing arrangement by default.<\/p>\n<p>That means it&#8217;s up to you to <a href=\"https:\/\/www.computerworld.com\/article\/3445158\/chrome-security-setting.html\">seek out the setting<\/a> for every extension you have installed and confirm it&#8217;s no broader than it needs to be. Otherwise, all of your browsing activity within Chrome \u2014 something that&#8217;s typically kept under lock and key inside your Google account \u2014 could be shared with external companies for no legitimate reason.<\/p>\n<p>All you have to do is type <strong>chrome:extensions<\/strong> into your browser&#8217;s address bar and then click the Details box for every extension on the page. Anytime you see a line labeled &#8220;Site access,&#8221; think carefully about the level of access that&#8217;s granted and whether it&#8217;s genuinely needed \u2014 or whether it&#8217;d make sense to bring it down a notch.<\/p>\n<p>While you&#8217;re thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better \u2014 and if you aren&#8217;t even using something, there&#8217;s no reason to keep it connected.<\/p>\n<p>And with that, we&#8217;re ready for our final two parts of account-protecting possibilities.<\/p>\n<p>Thinking about worst-case scenarios is never particularly pleasant \u2014 I&#8217;d much rather be eating crumpets, myself \u2014 but just as it&#8217;s important to have a plan in place for your physical and financial possessions, creating a virtual will for your Google account will make matters infinitely easier for your loved ones if and when you ever develop a mild case of death.<\/p>\n<p>Google has a simple system in place to manage this: Open up the <a href=\"https:\/\/myaccount.google.com\/inactive\" rel=\"noopener nofollow\" target=\"_blank\">Inactive Account Manager<\/a>, and you&#8217;ll find tools for determining exactly what should happen if your account ever becomes inactive for a certain period of time. You can specify the number of months that must go by without any sign of your presence, along with the email addresses and phone numbers Google should use to contact you for confirmation. And then, you can give Google the email addresses of any people you want to be notified once it&#8217;s clear that you&#8217;re no longer available.<\/p>\n<p>From there, you can specify exactly what types of information your chosen contacts will be able to access. You&#8217;ll even be able to leave a message for those people, if you want, and optionally create a broad autoreply that&#8217;ll be sent to anyone who emails you once your inactive period has begun (creepy!).<\/p>\n<p>Google&#8217;s Inactive Account Manager is like a virtual estate planning tool for all of your account-associated data.<\/p>\n<p>Even if you&#8217;ve gone through this process before, it&#8217;s worth going back in and revisiting your preferences occasionally to confirm the info is all still complete and accurate. When I looked at mine just now, for instance \u2014 a few years after initially setting up the system \u2014 a handful of newer account-related areas were <em>not<\/em> selected to be shared, presumably because they didn&#8217;t exist when I last reviewed the options. I had to manually check them all to be sure they&#8217;d be included in any post-consciousness account sharing.<\/p>\n<p>Last but not least is a step that won&#8217;t be right for everyone but could be hugely consequential for certain types of Google users. For anyone at a higher risk of a targeted attack, Google offers an elevated form of account security called the Advanced Protection Program.<\/p>\n<p>The program is described as being appropriate for business leaders, IT admins, activists, journalists, and anyone else who&#8217;s in the public eye and likely to be sought out by someone looking to do damage. It puts a series of heavy-duty restrictions on your Google account to make it especially difficult for anyone else to gain access \u2014 but as a result, it also makes things a bit more difficult for <em>you<\/em>.<\/p>\n<p>The core part of the Advanced Protection Program is a requirement to have a physical security key the first time you sign into your account on any new device. That means in addition to your password, you&#8217;ll need that specific form of two-factor authentication \u2014 either an approved key built into your phone or a <a href=\"https:\/\/support.google.com\/accounts\/answer\/7545682?hl=en&amp;ref_topic=9264881\" rel=\"noopener nofollow\" target=\"_blank\">standalone dongle<\/a> \u2014 in order to access your email, documents, or any other area of your Google account.<\/p>\n<p>As part of the added security, you also won&#8217;t be able to connect most third-party apps to your Google account \u2014 including those that require access to your Gmail or Google Drive in order to operate. That could create some challenges (such as <a href=\"https:\/\/www.androidcentral.com\/how-log-android-tv-if-youre-using-google-advanced-protection-program\" rel=\"noopener nofollow\" target=\"_blank\">signing into an Android TV device<\/a>, curiously enough) and require some compromises (such as no longer being able to use most third-party email clients with Gmail). And if you ever can&#8217;t get into your account for any reason, you&#8217;ll have to go through an extra-involved, multiday recovery process in order to restore access. You can read more about what the Advanced Protection Program is like to live with in <a href=\"https:\/\/www.androidcentral.com\/what-its-live-under-google-advanced-protection-program\" rel=\"noopener nofollow\" target=\"_blank\">this thoughtful overview<\/a>.<\/p>\n<p>Ultimately, only you can decide if the added inconveniences are worth the extra assurance. If you want the utmost in security for your Google account, though \u2014 and particularly if you&#8217;re someone who&#8217;s at a higher-than-average risk of being targeted \u2014 it&#8217;s something well worth considering.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3528554\/10-steps-to-smarter-google-account-security.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2020\/02\/google-account-security-100832892-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: JR Raphael| Date: Wed, 26 Feb 2020 03:00:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>There are important accounts to secure, and then there are <em>important<\/em> accounts to secure. Your Google account falls into that second category, maybe even with a couple of asterisks and some neon orange highlighting added in for good measure.<\/p>\n<p>I mean, really: When you stop and think about how much stuff is associated with that single sign-in \u2014 your email, your documents, your photos, your files, your search history, maybe even your contacts, text messages, and location history, if you use Android \u2014 saying it&#8217;s a &#8220;sensitive account&#8221; seems like an understatement. Whether you&#8217;re using Google for business, personal purposes, or some combination of the two, you want to do everything you possibly can to keep all of that information locked down and completely under your control.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3528554\/10-steps-to-smarter-google-account-security.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[1670,20885,714],"class_list":["post-17826","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-google","tag-productivity-software","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17826"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17826\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17826"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}