Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Hey You… Update Your Google Password, Right Now!

Hey You… Update Your Google Password, Right Now!

If you haven’t taken the time to go through and update your passwords lately, particularly the one protecting your Google account, you should do so… despite it undeniably being a pain. After all, Google serves various purposes and is attached to many accounts for most. Considering the number of data breaches and other cybersecurity issues this potentially contributes to, you will want to ensure your Google account is properly locked down.

What Does a Google Account Involve?

Seeing as Google has grown to include far more than the original search engine, there are a lot of things that the average user has that involve Google in some way. Anyone who owns an Android smartphone, or surfs the Internet via the Chrome browser, or checks their email via Gmail certainly has a Google account, and this is but a small sample from a considerable list of items.

So, if a user’s Google account were to be compromised, a lot of data could potentially be exposed:

  • Google.com (for custom tailored search results)
  • Gmail
  • Google Drive
  • Google Docs/Sheets
  • Google Maps
  • Android
  • Google Workspace
  • Google Chrome
  • YouTube

Again, this is a brief sample. Chances are that—if it has something to do with Android, Chrome, or of course Google—it’ll be tied to your Google account.

Updating a Google Password

Fortunately, the process to change your Google password is quite simple:

  1. Visit https://accounts.google.com/. If you aren’t signed in already, log in with your email/phone number and password.
  2. Click Security on the left-hand side.
  3. Look for Signing in to Google. Click Password.
  4. Google will usually prompt you to provide your current password, and then have you input a new password.

REMINDER: While password security should always be a priority, the password you use to lock down your Google account absolutely must be as secure as you can make it. Use a unique password that is strong, without any personally identifiable information or other password shortcuts involved. Using a password manager can help make this easier, both by storing all your different passwords for you and assisting you in generating ones that are secure.

Once you have updated your Google password, you may have to log back in on some of your devices.

Adding Some Extra Security to Your Google Account

To really protect your Google account and the data it holds, it helps to take your security to the next level by enabling 2-Step Verification/2-Factor Authentication. This will help protect your account, even if your password was somehow stolen.

After changing your password, on the Google Account page:

  1. Click the Security option on the left-hand side of the page.
  2. Click 2-Step Verification.
  3. Google may prompt you to enter your password again, just to make sure it’s you.
  4. Depending on what Google already knows about you, this might go a few different ways—you’ll either be prompted to set up a phone number to get a text message or phone call, or Google might walk you through setting this up on your smartphone. Either way, follow the on-screen instructions.

You have a few options available to you in terms of the verification process. One of the more convenient is the option to be sent an SMS message with a secondary code required before your account can be accessed from a new device. For more security, there’s the Google prompt, which serves up a notification on your mobile to be tapped to confirm login, or Google’s own Authenticator app.

Fair warning—if your workplace uses Google Workspace, you might need the help of an administrator to enable 2-step verification. For more information on securing your accounts (or any other IT question you have), turn to the team at Total Tech Care and reach out at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Upgrade Windows Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Social Media Saving Money Holiday Tech Term Microsoft Office Managed IT Services Automation Managed Service Operating System Computers Facebook Artificial Intelligence Cybercrime Hacking Internet of Things BYOD Wi-Fi Mobile Device Management Health Networking IT Support Spam Office 365 Telephone Systems Remote Alert Information Technology Information Covid-19 Managed Service Provider Social Engineering Mobility Router BDR Recovery Employer-Employee Relationship Bandwidth Big Data Remote Monitoring Data Breach Law Enforcement App History Mobile Computing Application Password Human Resources Money Encryption Applications Government Blockchain Office Tips Private Cloud Paperless Office Training How To Managed IT VPN Apps Data Storage Patch Management Remote Computing Mobile Office Servers Avoiding Downtime Flexibility Data Security Marketing Wireless WiFi IT solutions Entertainment Website Gmail Budget Bring Your Own Device Settings Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Two-factor Authentication Vulnerability Windows 7 Mouse Word HaaS Google Drive User Error Sports HIPAA Redundancy Meetings Vendor Management Keyboard Risk Management Hacker Telephone System Staff Software as a Service The Internet of Things Lithium-ion battery Save Time Machine Learning Remote Work Connectivity USB Vendor Cleaning Managed Services Firewall Display Virtual Reality Conferencing Apple End of Support Employee/Employer Relationship Education Physical Security Scam RMM Social Safety Data Protection PDF Botnet IT Plan Comparison Wearable Technology Proactive IT Unsupported Software CES Retail Digital Signage Hard Drives Best Practice Virus Instant Messaging YouTube Charger Robot Excel Business Technology Black Market Content Management Unified Threat Management Compliance Computer Accessories Biometrics Access Control OneNote Computer Care Procurement Virtual Desktop Virtual Assistant Workplace Strategy Current Events Net Neutrality Document Management Telephony Authentication Solid State Drive DDoS Wireless Technology Samsung Help Desk How to Downtime Printing Printer SharePoint Bluetooth Value Data storage Update Electronic Medical Records Managed Services Provider Automobile Spam Blocking Customer Service Environment Google Docs Database Hiring/Firing Identity Theft Computing Infrastructure IT Consultant Going Green Remote Workers Fax Server Processor SaaS Humor Battery Augmented Reality Shadow IT Fraud Hard Drive Legal Business Intelligence Remote Worker Network Congestion eWaste Internet Exlporer Worker Audit IT Management Cryptocurrency Computing Computer Fan Cache PCI DSS WIndows 7 Rootkit Amazon Web Services Virtual Machine Safe Mode 2FA Criminal Fiber Optics Shortcut Employee Benefits Cabling Cost Management GDPR Relocation Workers Hosted Computing Messaging FENG Wireless Internet Policy Online Shopping Hypervisor Social Networking Video Games File Sharing Dark mode IBM Trend Micro Smart Technology Specifications Default App Worker Commute Flash Camera Inventory SMS Wire Procedure User Running Cable Evernote Saving Time PowerPoint Windows Media Player Experience Scalability Software Tips dark theme Supercomputer Shopping Travel Google Search Memory Millennials IT Infrastructure Business Owner Sync Printers Emails AI Smart Office FinTech Managing Stress NarrowBand Wireless Charging Bing Search Social Network Two Factor Authentication Workforce Investment Cameras Virtual Private Network iPhone Netflix Root Cause Analysis Employees Cables Employee/Employer Relationships Science HBO Windows 365 Knowledge Music ISP Telecommuting ROI Skype Project Management Files Nanotechnology Video Conferencing Data loss Sales Distributed Denial of Service Chromecast Cortana Bitcoin Customer Relationship Management Shortcuts Outlook Point of Sale Leadership Digital Signature Personal Troubleshooting Cryptomining Analyitcs Uninterrupted Power Supply Printer Server Programming Start Menu Warranty Colocation Supply Chain Management Screen Mirroring HVAC Monitoring Loyalty Google Apps Batteries Frequently Asked Questions Windows 8.1 Monitor Analysis Digitize Books Antivirus Windows Server 2008 R2 Mobile Administrator Windows 10s Devices Cast Enterprise Content Management Customer relationships Windows 8 Tip of the week MSP Email Best Practices Reputation webinar Accountants IT Assessment IT service Streaming Media Emergency Manufacturing Tech Support Employer Employee Relationship Credit Cards Content Professional Services Microchip Public Cloud Thought Leadership Techology Password Management Computer Tips Laptop Assessment Password Manager Managed IT Service Security Cameras Tablet Biometric Security Windows Server 2008 Virtual CIO Customers OneDrive Domains Multi-Factor Security Peripheral Audiobook Tools Search Engine Twitter NIST Digital Security Cameras IaaS Touchpad Television Business Mangement Using Data Maintenance 5G Bloatware Smart Tech Copiers Consultant Trending Quick Tip Amazon Analytics Politics Advertising Addiction Ergonomics Public Computer Recycling Smartwatch Tablets OLED Entrepreneur Regulations Wiring Practices Development Best Available Notifications Transportation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code