How to check the security of your Gmail account

{title}

It does not matter if we are occasional or habitual users of the internet, that privacy and security in the network should be a vital issue for all of us. We use social networks like Facebook in which we include a lot of personal data without just realizing it. And today Google knows more about us than ourselves.

Another key point if we talk about personal data, is email . Email is very important today for most of us. We store important information on a number of occasions that we would like to keep private, so the security of our account is very important and therefore we should be concerned.

If we use Gmail as the manager of our email, we have the possibility to guarantee the security of our account and the information we store in it by following a few simple basic steps. Next we will show what kind of configuration and features we should check in our Gmail account, to ensure that the security is adequate and our email is safe.

1. Automatic email verification resent


One of the functions of our Gmail account is automatic mail forwarding. This means that we can configure an email so that all emails sent from our account are forwarded to an address we have selected . This can be useful in case we want to keep track of it. To configure this we have to access the main Gmail menu represented with a gear wheel in the upper right corner of the application and from the menu select “Settings”.

Once inside the configuration, we have to access the “Forwarding and POP / IMAP mail” section at the top and in the “forwarding” section enter the email to which we want these messages to arrive. This configuration also serves to verify that there is no wrong email hosted here.

{title}

2. Account permissions


Another option offered by Gmail, is to give permission to another person to access our account and can read, delete and send emails from the "grant access to your account" function. In the event that we do not want this to happen, we must ensure that this option is not enabled in our account.

To verify this, we have to access the "accounts and import" section within the configuration. Once here we must go to the section "grant access to your account" and verify that everything is correct and that there is no wrong account.

{title}

3. Recovery account settings


It is important that we check that the recovery settings of our Gmail account are recent and correct. Thus, in the event that for some reason we lose access to our Gmail account, these recovery options are really useful so that we can restore access in a safe and simple way.

To verify this, we have to open the “configuration” section again and look under the “accounts and import” tab - “change the account settings ”. Within this section we have to select “change password recovery options”. From here we will be able to make the changes that we consider appropriate.

{title}

4. Account activity details


Another of the options offered by Gmail, is to be able to check a history of Gmail with the different access data to our account (IP address, location and time) . In the event that we find some unusual location or time access here, we must make sure to change our Gmail password immediately.

$config[ads_text5] not found

To verify this, we have to place ourselves at the bottom of the page of our Gmail account, and select “Detailed information”. A pop-up window will appear with all this information.

{title}

5. Perform security review


Finally it would be convenient to check all the security parameters offered by Gmail through its "security review" section . These are nine steps for setting up the proper security of our account . These steps are: secure our password, update account recovery options, unusual activity review, Gmail settings, clean device maintenance, browser update, two-step verification, identity theft prevention and fraud.

$config[ads_text6] not found

{title}

Remember that it is very important to make sure that the emails we receive in our account are not spam and that they are not trying to infect us. For this we recommend this tutorial in which it is explained how we can detect and avoid them.

Detect and avoid Phishing mail