8 min read
8 min read

Google’s security checkup tool reviews your account for potential risks. It checks your recovery information, connected devices, third-party app access, and recent security events. The tool also gives personalized suggestions to strengthen your security.
You’ll get notified if Google detects something unusual, like sign-ins from unfamiliar locations. Running a security checkup regularly ensures your account stays protected against evolving threats. It only takes a minute and can prevent serious breaches. You can find this tool at g.co/securitycheckup.

Two-step verification adds an extra layer of security by requiring both your password and a secondary code sent to your phone. Even if someone steals your password, they won’t be able to access your account without the verification code.
You can use Google prompts, an authenticator app, or a physical security key for added protection. This is one of the most effective defenses against unauthorized access and phishing attacks. Set it up through your Google account’s security settings immediately.

Google lets you see every device that’s signed into your account. You can immediately revoke access if you don’t recognize a device or location. This setting helps you catch suspicious activity early, especially if your login credentials have been compromised elsewhere.
From your Google account dashboard, go to “Security” and select “Your devices.” You’ll see a list of phones, tablets, computers, and their last access times. Regularly checking this list helps you stay in control of your account.

Passkeys and physical security keys are stronger alternatives to passwords. Google now supports passkeys, which let you sign in using fingerprint or face recognition, depending on your device. These methods resist phishing because there’s nothing to type or steal.
You can also use physical security keys like Google Titan, which plug into your computer or use USB-A/USB-C or NFC. These keys are especially recommended for people at high risk of cyberattacks, such as journalists, politicians, or business leaders.

Many apps request access to your Google account, but not all are trustworthy. Some may have outdated security or abuse their access to your data.
Visit your Google account’s “Third-party apps with account access” section to review which apps have permission to view or manage your Gmail, Drive, Calendar, or contacts. Remove anything you don’t use or trust. Keeping this list short and clean significantly reduces your exposure to data breaches from external services.

Google sends security alerts when it detects unusual activity like unfamiliar logins or password changes. You can manage these alert preferences under your account’s “Security” settings. Ensure your recovery email and phone number are current so you’ll get alerts immediately.
Don’t ignore them; even a single unusual sign-in could indicate a breach in progress. These alerts act as your early warning system, allowing you to lock down your account quickly.

Enhanced Safe Browsing protects you against dangerous sites, downloads, and extensions. When turned on, it shares real-time data with Google to block new threats faster. This setting is found in Chrome’s “Privacy and security” section.
While it sends some browsing data to Google, it’s anonymized and used strictly for security purposes. It’s beneficial if you frequently visit unfamiliar websites or click on lots of links. It can block phishing pages and malicious downloads before harm is done.

Google’s built-in password manager saves your logins and can auto-fill them securely. It also monitors your saved passwords for breaches across the web. If stored passwords appear in a known data leak, Google will alert you and suggest changing them.
You can check this under “Password Manager” in your Google account. Weak or reused passwords are a significant reason breaches occur. Using strong, unique ones and letting Google flag compromised ones is a simple step toward safety.

Recovery options are critical for returning to your account if you forget your password or get locked out. Use a phone number and recovery email that you always have access to. Google uses these to send verification codes or unlock instructions.
Keep these details updated in your Google account settings. Never use work emails or numbers, as you might lose access to them. Valid recovery methods can distinguish between a quick fix and permanent account loss.

If you sign into your Google account on a public or borrowed device, avoid turning on account sync. Syncing transfers your Chrome history, passwords, and other sensitive data to that device. Even if you sign out later, remnants may remain.
In settings, make sure “Sync” is off or use Guest Mode instead. For mobile devices, remove your account entirely when you’re done. Sync is convenient but risky on shared devices, and disabling it prevents accidental data exposure.

If your phone or laptop gets stolen and doesn’t have a lock screen, your Google account can be compromised within seconds. Always use a strong screen lock like PIN, password, fingerprint, or face recognition.
For Android, go to Settings > Security > Screen lock. For computers, set up password protection on wake. A screen lock is your first defense, preventing physical access to your Google data even if your device is lost or stolen.

If you’re sharing devices or services in a family, it’s much safer to set up a Google Family Group using the Google Family Link app. It lets you manage permissions, app access, and payment settings across multiple accounts, without the risks of sharing one login.
With Family Link, you can approve child accounts, set screen time limits, and control sharing in services like Google Photos and YouTube. It helps keep your family connected, secure, and organized.

Google collects activity data like search history, location, and app usage. While this helps personalize services, it can also become a privacy risk if accessed in a breach. Visit your Google account’s “My Activity” page and review what’s being stored.
You can pause or delete Web & App Activity, Location History, and YouTube History. Controlling this data minimizes exposure if your account is compromised and keeps your digital footprint more private by default.

Always browse in incognito or guest mode when using someone else’s device or a public computer. This prevents your Google account activity from being stored on that device. Incognito turns off history, cookies, and form entries, while guest mode keeps local files out of reach.
Both modes offer short-term privacy, but should still be combined with logging out when done. It’s a simple yet effective step to protect your account from accidental data leaks on shared systems.
Want extra privacy while browsing? Google’s Unified Security AI works with Incognito mode to protect your data.

Over time, you may accumulate connected services or unused data within your Google account. These can become security liabilities if forgotten. Go through your account settings and remove old devices, apps, or services you no longer use.
Also, check stored files in Google Drive or Gmail for sensitive information you no longer need. Delete what’s unnecessary. The less data you store, the less you lose in a breach. Routine cleanup keeps your digital footprint lean and secure.
Regularly deleting unused Google services can boost privacy, and now with Android’s new auto reboot, Google is tightening security even more.
Do you think features like auto-reboot help with privacy, or are they overkill? Let us know what you think below.
Read More From This Brand:
Don’t forget to follow us for more exclusive content right here on MSN.
This content is exclusive for our subscribers.
Get instant FREE access to ALL of our articles.
Dan Mitchell has been in the computer industry for more than 25 years, getting started with computers at age 7 on an Apple II.
We appreciate you taking the time to share your feedback about this page with us.
Whether it's praise for something good, or ideas to improve something that
isn't quite right, we're excited to hear from you.
Stay up to date on all the latest tech, computing and smarter living. 100% FREE
Unsubscribe at any time. We hate spam too, don't worry.

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!