{"id":166,"date":"2015-01-19T13:39:56","date_gmt":"2015-01-19T13:39:56","guid":{"rendered":"http:\/\/blog.iglobesolutions.net\/?p=166"},"modified":"2015-01-20T11:35:42","modified_gmt":"2015-01-20T11:35:42","slug":"secure-gmail-account","status":"publish","type":"post","link":"https:\/\/iglobesolutions.net\/blog\/secure-gmail-account\/","title":{"rendered":"How we can secure Gmail Account"},"content":{"rendered":"<p align=\"justify\">Gmail is the most used webmail service throughout the world.\u00a0 It is popular due to its user friendliness and security features. Although Gmail has provided many security measures but still the user face problems due to increased attack of hackers, phishers and scammers from all over the web.<br \/>\nDue to increased security threats Google has recently added new features which increase your account security. The topic covers those measures and how you can boost your <a href=\"http:\/\/blog.iglobesolutions.net\/gmail-technical-support\/\" target=\"_blank\">email account security<\/a>.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/How-we-can-secure-Gmail-Account.jpg\"><img loading=\"lazy\" class=\"aligncenter  wp-image-175\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/How-we-can-secure-Gmail-Account.jpg\" alt=\"How we can secure Gmail Account\" width=\"717\" height=\"269\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/How-we-can-secure-Gmail-Account.jpg 800w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/How-we-can-secure-Gmail-Account-300x113.jpg 300w\" sizes=\"(max-width: 717px) 100vw, 717px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>1. Gmail has added two step verification<\/strong> where in you will have to enter the message delivered to your mobile number each time you will try to access your account. This will make impossible to hack into your account without the phone no.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/2-step-verification.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-167\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/2-step-verification.jpg\" alt=\"2-step-verification\" width=\"500\" height=\"419\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/2-step-verification.jpg 500w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/2-step-verification-300x251.jpg 300w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/2-step-verification-268x225.jpg 268w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>2. Make Sure to check the HTTP security<\/strong><br \/>\nThis can be done as follows. Log into your account and click on the gear icon on right hand side. From there Click on Settings-&gt;General-&gt;browser connection and check the option \u201cAlways uses HTTP\u201d. Save the changes.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/enable-https-security.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-168\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/enable-https-security.jpg\" alt=\"enable-https-security\" width=\"500\" height=\"372\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/enable-https-security.jpg 500w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/enable-https-security-300x223.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><br \/>\nWith the help of the above steps your account is protected by a security protocol which provides authenticated and encrypted communication.<\/p>\n<p align=\"justify\"><strong>3. Check Granted Account Access<\/strong><br \/>\nIF you observe a suspicious activities in your account. The first thing you should check the granted account access settings. Check it by following the process Loginto your account-&gt;Gear icon-&gt;Settings-&gt;Account and import-&gt;Grant access to your account. Check whether someone has added another account to make it easier for accessing your account. If you observe this you can prevent this by checking the option Mark conversation as read when opened by others. This will help you to check whether some other person is reading your mails.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/check-granted-account-access.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-169\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/check-granted-account-access.jpg\" alt=\"check-granted-account-access\" width=\"500\" height=\"119\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/check-granted-account-access.jpg 500w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/check-granted-account-access-300x71.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>4. Check the Filter, Forwarding and POP\/IMAP<\/strong><br \/>\nFilter enables the hackers to do theft issues. You can prevent it by following the process-&gt;log into your account-&gt; gear icon-&gt;Settings-&gt; delete the filter you didn\u2019t put it there<br \/>\nYou will need to check the \u201cForwarding and POP\/IMAP\u201d so that there is no forwarding address .<\/p>\n<p align=\"justify\"><strong>5. Disable unauthorized access<\/strong><br \/>\nMany Gmail users allow the permission to hack account while accessing Google account and show two much trust in various websites. You can check this by Loginto the Google account-&gt; access https:\/\/security.google.com\/settings\/security\/permissions-&gt;<br \/>\nYou will see a lot of websites that you have granted access to. Click \u201cRevoke Access\u201d against applications that are doubtful.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/revoke-unauthorized-access.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-174\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/revoke-unauthorized-access.jpg\" alt=\"Disable unauthorized access\" width=\"500\" height=\"232\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/revoke-unauthorized-access.jpg 500w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/revoke-unauthorized-access-300x139.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>6. Check if there is any account activity<\/strong><br \/>\nYou can check if there is any account activity by going through Activity Information panel. You can do this by log into your account and on the bottom part of your mail you will see \u201cLast account Activity (number) minutes ago\u201d and by clicking on detail you can easily see the access type, location &amp; date that you have signed into Gmail in the past few days.<br \/>\nUnder the panel you can also set the Alert preference so that Gmail can give you alerts whenever there is any unusual activity.<\/p>\n<p align=\"justify\"><strong>7. Use Security plugins<\/strong><br \/>\nWeb of trust is excellent plug-in that checks whether you are accessing a bad site or not. When you access a bad site Web of trust will show you a dark page of the front page of that site and block you from accessing the page. WOT is available for Firefox, Safari and Google chrome.<br \/>\nYou can use Better privacy to delete the long term cookies. It is only available with Firefox.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/sequrity-plugins.jpg\"><img loading=\"lazy\" class=\"aligncenter  wp-image-173\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/sequrity-plugins.jpg\" alt=\"sequrity-plugins\" width=\"504\" height=\"378\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/sequrity-plugins.jpg 1024w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/sequrity-plugins-300x225.jpg 300w\" sizes=\"(max-width: 504px) 100vw, 504px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>8. Make your <a href=\"http:\/\/blog.iglobesolutions.net\/data-recovery-gmail\/\" target=\"_blank\">mail recovery <\/a>security question strong<\/strong><br \/>\nMake your recovery security question such that it is impossible for the hackers to know the answers. You can do this by Loginto your account-&gt;gear icon-&gt;Settings-&gt; Accounts and Import-&gt; Change password recovery options click Edit on the Security question option and choose your new question.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/gmail_security_question.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-172\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/gmail_security_question.jpg\" alt=\"gmail_security_question\" width=\"400\" height=\"248\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/gmail_security_question.jpg 400w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/gmail_security_question-300x186.jpg 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>9. Strong password<\/strong><br \/>\nYou can create a strong password by trick called Mnemonic. Suppose you choose a long password \u201cI see god in everyone\u201d. Then you can choose the first letter of every word \u201cIsgie\u201d to create a strong password. You can also use special symbol like @ in between the password to make it stronger.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/Strong-password.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-171\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/Strong-password.jpg\" alt=\"Strong password\" width=\"500\" height=\"292\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/Strong-password.jpg 500w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/Strong-password-300x175.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p align=\"justify\"><strong>10. Don\u2019t trust anyone<\/strong><br \/>\nYou can easily find mails from your friend\u2019s hacked account asking for any help. In that case you should inform this to your friend so no one can ditch you.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/do-not-trust-anyone.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-170\" src=\"http:\/\/blog.iglobesolutions.net\/wp-content\/uploads\/2015\/01\/do-not-trust-anyone.jpg\" alt=\"do-not-trust-anyone\" width=\"690\" height=\"388\" srcset=\"https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/do-not-trust-anyone.jpg 690w, https:\/\/iglobesolutions.net\/blog\/wp-content\/uploads\/2015\/01\/do-not-trust-anyone-300x169.jpg 300w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gmail is the most used webmail service throughout the world.\u00a0 It is popular due to its user friendliness and security features. Although Gmail has provided many security measures but still the user face problems due to increased attack of hackers,&#8230;<span class=\"read-more\"><a href=\"https:\/\/iglobesolutions.net\/blog\/secure-gmail-account\/\">Continue Reading &rarr;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[17,33],"tags":[39,40],"_links":{"self":[{"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/posts\/166"}],"collection":[{"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/comments?post=166"}],"version-history":[{"count":1,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/posts\/166\/revisions"}],"predecessor-version":[{"id":176,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/posts\/166\/revisions\/176"}],"wp:attachment":[{"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/media?parent=166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/categories?post=166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iglobesolutions.net\/blog\/wp-json\/wp\/v2\/tags?post=166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}