[ad_1]
I’ll never forget the caller on my national radio show asking me for guidance because her brother was scammed out of $450,000.
He trusted the wrong person, and he’s far from alone. People simply don’t realize they’re being taken for a ride until it’s too late.
Then clues pop up. Maybe you sent a bunch of gift card codes, or there are emails you didn’t write in your outbox. Or worse, you get a notice about a loan in your name.
It’s the reason to check your Google account’s security. It only takes a minute and will reveal who has access to your account. Fingers crossed, it’s just you.
60-second safety check
I’m going to show you how to find digital clues a hacker got into your account, but that’s not all. This tip also works for spotting snoops. Is a friend or family member poking around your Google or Gmail account? Let’s sniff them out.
People are also reading…
Go to google.com/devices. Sign in if you aren’t already.
Here, you’ll see a list of devices — the computers, smartphones and tablets you’re signed into or have been signed into within the last 28 days.
You can click each one to see which browser was used. That might be a tip-off someone else has logged in, say you see Chrome, but you only use Safari.
Don’t panic if you see the same device multiple times. Each session (or instance you logged in) is recorded.
You may also see devices that have been inactive for a long time, like an old phone or computer you don’t use anymore. It’s wise to sign these devices out remotely.
Click the one you want, then Sign out. This will remove access to your Google account from the device entirely.
You should also take that step for any devices you once used to access your account, like a friend’s tablet or a work computer.
Here’s the red flag
What happens if you see a computer, phone, tablet, or device you don’t recognize? That might be a bad sign but don’t panic right away.
You could have signed in through a VPN or you were on vacation, hence a different city. Or you borrowed a device from someone else.
If you don’t remember or you’re sure it wasn’t you, do this:
Click the device and choose Don’t recognize something? or Sign out. Again, this will sign the device out remotely.
Now it’s time to protect your account
When it comes to cybersecurity, take the conservative approach. Maybe it was you, but there’s a chance someone else got into your account.
That means it’s time to change your password to be sure whoever logged in can’t do so again. Don’t reuse an old password or choose something easy to guess.
Bonus tip: Take a walk down your Google memory lane
Google’s Timeline feature shows you a summary of everywhere you’ve gone — down to the travel time, route you took and even the pictures you took when you arrived. It’s really worth checking out if you never have.
Go to timeline.google.com
Search for a date or click one of the blue bars below the date field. There you can see places you’ve visited, your route, pictures you took and timestamps for everything.
At the bottom, there’s a red box with the number of places Google has tracked. Click that to see where you’ve been most.
If that whole exercise gave you the creeps, click the blue button at the bottom to Manage Location History.
From here, you can select Turn off or Turn off and delete activity.
You’ll also see checkboxes for each device tied to your account with access to location history.
[ad_2]
Source link