Image by - Alexis C. Schultz
Don’t receive important mail
If you know you’ll be receiving important mail, which involved a serious amount of money, such as a business deal, signature need for a contract, or something important to do with your bank, don’t go through Gmail. Google is constantly working to update their servers and software, but hackers do find their way in from time to time. If you know you have incoming mail which is dealing with a large amount of money, use a virtual address for mail. With the location in the real world, away from home and in a location totally of your choosing, you can have peace of mind knowing that a hard copy of your important mail has been sent to you. You can also, pick up the mail at any time with no time cutoff regarding an amount of days.
Photo credit - David Whelan
Last account activity
One of the ways to protect yourself from impersonators is to link your account, with another account of yours. At the end of your page, on the bottom right-hand side, there is a link that says ‘last account activity.' This showed you when you were previously logged on or essentially when your account was last active. Click on the details, and if the time isn’t correlated to the correct times you were on, chances are a bot or hacker was on your account. You may even have got a message from Google, asking you via text or notification on your account, whether or not it's okay if your details are changed.
Setup your verification
Google has an option for you to manually put a two-step authentication on your account, so it's not just your email and password that’s needed to access it. Go to the security tab which should be in the account settings option or page. You’ll find a button which says ‘change password,' then click on it to open up more options. The authentication process relies upon you to give Google your phone number, but it must be a mobile so you can receive as SMS i.e. a text message. You’ll be sent a code through text or a voice message. After you have authenticated that you’ll be one step closer. Next, when you log back in using a computer, Google will automatically believe that this is your main machine and trust it, meaning you won’t need additional code to verify it.
It takes a little time, but with good practice, you’ll learn the ins and out of Gmail. Don’t risk your truly valuable mail, especially if it deals with a large amount of money. Connect multiple accounts together so they each can guard against the other being hacked, set up a two-step verification for increased layers of security.
Check the comment section below for additional information, share what you know, or ask a question about this article by leaving a comment below. And, to quickly find answers to your questions, use our search
Note: Some of the information in samples on this website may have been impersonated or spoofed.
Comments, Questions, Answers, or Reviews
To protect your privacy, please do not post or remove sensitive information in or from your comments, questions, or reviews. NB: We will use your IP address to display your approximate location to other users when you make a post. That location is not enough to find you.
Your comment, answer, or review will be set as anonymous because you are not signed in. An anonymous comment, answer, or review cannot be edited or deleted, therefore, review it carefully before posting. Sign-in.
Write Your Comment, Question, Answer, or Review