There is a lot that you can do to improve the security of your Google account. It starts with a secure password but does not end there. You can enable 2-step verification for example to add another layer of protection to the account, or make sure that you receive phone alerts when suspicious activities are recognized by the system.
The Security Settings page is the central hub for many of these security related preferences and information. There you can change your account password, enable or disable 2-step verification, configure phone alerts, check app and website permissions, or set recovery phone and email.
The Recent Activity pages have been improved in recent time. The page lists two, devices & activity and notifications & alerts.
Devices & Activity lists all devices that have been used to connect to the Google account in the past 28 days. The page lists each device with its name (or operating system), a location and when the sign in was recorded.
A click on a device displays additional information about it. This includes web browsers or programs used to connect, the device model if it is a mobile device, the login location for each browser used, the type of access and whether a device has full account access or not.
For some devices sign in information may be available. If that is the case you can reveal information about the IP address used as well.
Access can be removed for devices connected to the account in the past which is useful if you lost your phone, if your computer got stolen or if your account has been hacked and devices are used to connect to it that you don't own.
The Notifications & Alerts page on the other hand lists all security alerts and security-related actions of the last 28 days. This includes sign-ins, password changes, the use of recovery options or if the phone number has changed or was added in the first place.
A click on a log entry displays IP addresses, the device used for the connection and the location.
This can be quite useful as well as you can check if you recognize all activities. If you don't, you find information about what a third-party did, for instance that someone changed the recovery phone number or signed in at a time where you were not on the Internet.
You can bookmark those two pages directly or the central page. It is probably a good idea to check the two pages regularly to make sure that everything's alright with the account. It can also be useful to unlink any old device from the account.
Now You: What's the first thing you do when you notice unauthorized access to your account? (via Caschy)Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.