Was this helpful?
Thumbs UP Thumbs Down

9 Google security settings that could save you from a data breach

Google password manager logo

Enable Google’s security checkup tool

Google’s security checkup tool reviews your account for potential risks. It checks your recovery information, connected devices, third-party app access, and recent security events. The tool also gives personalized suggestions to strengthen your security.

You’ll get notified if Google detects something unusual, like sign-ins from unfamiliar locations. Running a security checkup regularly ensures your account stays protected against evolving threats. It only takes a minute and can prevent serious breaches. You can find this tool at g.co/securitycheckup.

google two step verification on smartphone sydney 9 june 2023

Turn on two-step verification for your Google account

Two-step verification adds an extra layer of security by requiring both your password and a secondary code sent to your phone. Even if someone steals your password, they won’t be able to access your account without the verification code.

You can use Google prompts, an authenticator app, or a physical security key for added protection. This is one of the most effective defenses against unauthorized access and phishing attacks. Set it up through your Google account’s security settings immediately.

Man using smartphone showing security

Review devices connected to your account

Google lets you see every device that’s signed into your account. You can immediately revoke access if you don’t recognize a device or location. This setting helps you catch suspicious activity early, especially if your login credentials have been compromised elsewhere.

From your Google account dashboard, go to “Security” and select “Your devices.” You’ll see a list of phones, tablets, computers, and their last access times. Regularly checking this list helps you stay in control of your account.

passwordless authentication with passkeys is a modern approach that eliminates

Use a passkey or physical security key

Passkeys and physical security keys are stronger alternatives to passwords. Google now supports passkeys, which let you sign in using fingerprint or face recognition, depending on your device. These methods resist phishing because there’s nothing to type or steal.

You can also use physical security keys like Google Titan, which plug into your computer or use USB-A/USB-C or NFC. These keys are especially recommended for people at high risk of cyberattacks, such as journalists, politicians, or business leaders.

Man writing 'Third Party' on transparent screen.

Limit third-party app access to your Google data

Many apps request access to your Google account, but not all are trustworthy. Some may have outdated security or abuse their access to your data.

Visit your Google account’s “Third-party apps with account access” section to review which apps have permission to view or manage your Gmail, Drive, Calendar, or contacts. Remove anything you don’t use or trust. Keeping this list short and clean significantly reduces your exposure to data breaches from external services.

Businessman holding smartphone with virtual yellow bell ringing for application notification alert concept.

Set up alerts for suspicious account activity

Google sends security alerts when it detects unusual activity like unfamiliar logins or password changes. You can manage these alert preferences under your account’s “Security” settings. Ensure your recovery email and phone number are current so you’ll get alerts immediately.

Don’t ignore them; even a single unusual sign-in could indicate a breach in progress. These alerts act as your early warning system, allowing you to lock down your account quickly.

Turn on Enhanced Safe Browsing in Chrome

Enhanced Safe Browsing protects you against dangerous sites, downloads, and extensions. When turned on, it shares real-time data with Google to block new threats faster. This setting is found in Chrome’s “Privacy and security” section.

While it sends some browsing data to Google, it’s anonymized and used strictly for security purposes. It’s beneficial if you frequently visit unfamiliar websites or click on lots of links. It can block phishing pages and malicious downloads before harm is done.

Google password manager logo

Use Google’s password manager and check for compromised logins

Google’s built-in password manager saves your logins and can auto-fill them securely. It also monitors your saved passwords for breaches across the web. If stored passwords appear in a known data leak, Google will alert you and suggest changing them.

You can check this under “Password Manager” in your Google account. Weak or reused passwords are a significant reason breaches occur. Using strong, unique ones and letting Google flag compromised ones is a simple step toward safety.

recovery

Set up recovery options with a trusted phone and email

Recovery options are critical for returning to your account if you forget your password or get locked out. Use a phone number and recovery email that you always have access to. Google uses these to send verification codes or unlock instructions.

Keep these details updated in your Google account settings. Never use work emails or numbers, as you might lose access to them. Valid recovery methods can distinguish between a quick fix and permanent account loss.

whatsapp chat back up not on google drive sydney 3

Disable account sync on untrusted devices

If you sign into your Google account on a public or borrowed device, avoid turning on account sync. Syncing transfers your Chrome history, passwords, and other sensitive data to that device. Even if you sign out later, remnants may remain.

In settings, make sure “Sync” is off or use Guest Mode instead. For mobile devices, remove your account entirely when you’re done. Sync is convenient but risky on shared devices, and disabling it prevents accidental data exposure.

users enhance cyber protection by typing secure login credentials incorporating

Activate screen lock on devices with Google access

If your phone or laptop gets stolen and doesn’t have a lock screen, your Google account can be compromised within seconds. Always use a strong screen lock like PIN, password, fingerprint, or face recognition.

For Android, go to Settings > Security > Screen lock. For computers, set up password protection on wake. A screen lock is your first defense, preventing physical access to your Google data even if your device is lost or stolen.

Google family link logo displayed on phone

Use Family Link to manage shared access with control

If you’re sharing devices or services in a family, it’s much safer to set up a Google Family Group using the Google Family Link app. It lets you manage permissions, app access, and payment settings across multiple accounts, without the risks of sharing one login.

With Family Link, you can approve child accounts, set screen time limits, and control sharing in services like Google Photos and YouTube. It helps keep your family connected, secure, and organized.

Review your activity controls and disable unnecessary tracking

Google collects activity data like search history, location, and app usage. While this helps personalize services, it can also become a privacy risk if accessed in a breach. Visit your Google account’s “My Activity” page and review what’s being stored.

You can pause or delete Web & App Activity, Location History, and YouTube History. Controlling this data minimizes exposure if your account is compromised and keeps your digital footprint more private by default.

kaunas lithuania  2024 april 16 incognito browsing mode on

Use incognito or guest mode for private browsing

Always browse in incognito or guest mode when using someone else’s device or a public computer. This prevents your Google account activity from being stored on that device. Incognito turns off history, cookies, and form entries, while guest mode keeps local files out of reach.

Both modes offer short-term privacy, but should still be combined with logging out when done. It’s a simple yet effective step to protect your account from accidental data leaks on shared systems.

Want extra privacy while browsing? Google’s Unified Security AI works with Incognito mode to protect your data.

Delete key on a white keyboard

Delete unused Google services or data regularly

Over time, you may accumulate connected services or unused data within your Google account. These can become security liabilities if forgotten. Go through your account settings and remove old devices, apps, or services you no longer use.

Also, check stored files in Google Drive or Gmail for sensitive information you no longer need. Delete what’s unnecessary. The less data you store, the less you lose in a breach. Routine cleanup keeps your digital footprint lean and secure.

Regularly deleting unused Google services can boost privacy, and now with Android’s new auto reboot, Google is tightening security even more.

Do you think features like auto-reboot help with privacy, or are they overkill? Let us know what you think below.

Read More From This Brand:

Don’t forget to follow us for more exclusive content right here on MSN.

If you liked this story, you’ll LOVE our FREE emails. Join today and be the first to get stories like this one.

This content is exclusive for our subscribers.

Get instant FREE access to ALL of our articles.

Was this helpful?
Thumbs UP Thumbs Down
Prev Next
Share this post

Lucky you! This thread is empty,
which means you've got dibs on the first comment.
Go for it!

Send feedback to ComputerUser



    We appreciate you taking the time to share your feedback about this page with us.

    Whether it's praise for something good, or ideas to improve something that isn't quite right, we're excited to hear from you.