{"id":658,"date":"2012-11-23T10:00:17","date_gmt":"2012-11-23T15:00:17","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=658"},"modified":"2019-11-15T15:27:16","modified_gmt":"2019-11-15T11:27:16","slug":"4-ways-to-secure-your-gmail-account","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/4-ways-to-secure-your-gmail-account\/658\/","title":{"rendered":"4 ways to secure your Gmail account"},"content":{"rendered":"<p>The hacking of Gmail accounts has been a constant occurrence for several years now. Those who have had their <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/google-warning-gmail-users-china-spying-attempts-092310\" target=\"_blank\" rel=\"noopener nofollow\">own accounts hacked<\/a> know that Gmail notifies users when their accounts have been compromised or if attackers have tried to access their account from an unknown machine, and Google instructs them to create a new password to make their accounts are secure again.<\/p>\n<p>But users who only create a new password may very soon find that their accounts have been compromised yet again. That\u2019s because once hackers have accessed Gmail they have a variety of tools at their disposal to keep accessing it without needing to know your new password. If your Gmail has been hacked, take these steps to ensure it is truly secure:<\/p>\n<p><strong>Check Your Filters<\/strong>: The easiest way for a hacker to keep accessing your email after you\u2019ve supposedly re-secured your account is to set up forwarding rules that push your emails to them.<\/p>\n<p style=\"padding-left: 30px;\">Under Settings-&gt;Forwarding and POP\/IMAP, check to make sure that \u2018disable forwarding\u2019 is selected. Then check your filters list and make sure there aren\u2019t any rules set up to forward email to any address you don\u2019t recognize.<\/p>\n<p><strong>Check Password Recovery Settings<\/strong>: The next easiest way for a hacker to maintain access to your account is to alter your password recovery settings.<\/p>\n<p style=\"padding-left: 30px;\">Go to settings-&gt;Accounts and Import-&gt;Google account settings-&gt;Change password recovery options-&gt;Email.<\/p>\n<p>Make sure an additional recovery email address wasn\u2019t added. Also check to make sure that neither the SMS number nor the security question has been changed. A crafty attacker will keep the security question the same but change the answer to one that they know.<\/p>\n<p><strong>Check Documents and Calendars<\/strong>: Gmail offers lots of tools beyond just email and each one offers attackers more backdoors to your account. If you have Google Voice, check to make sure your voicemails and text messages aren\u2019t being sent to additional addresses. Next, check Google Drive (formerly Google Docs) to make sure your documents are shared only with people you know you\u2019ve authorized. In the Calendar settings, click \u2018reset private URLs\u2019 in the private address section \u2013 that changes the private address that can access your calendar. Then click the \u2018Share this calendar\u2019 tab and make sure there aren\u2019t any email addresses in there that you don\u2019t recognize.<\/p>\n<p><strong>Check for Rogue Applications<\/strong>: Because Gmail is an entire suite of applications and not just an email account, you\u2019ll have to check to see if the attacker added his own malicious application. These days we give applications all sorts of permissions and don\u2019t think twice about it; an attacker can add their own application that gives them full access privileges to your account, so make sure you recognize all the applications in your account \u2013 and for your own sake, find out what permissions they have and determine if you\u2019re really comfortable with what you find.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hacking of Gmail accounts has been a constant occurrence for several years now. Those who have had their own accounts hacked know that Gmail notifies users when their accounts<\/p>\n","protected":false},"author":32,"featured_media":663,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[177,176,175,173,97],"class_list":{"0":"post-658","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-calendar","9":"tag-documents","10":"tag-gmail","11":"tag-google-voice","12":"tag-security-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/4-ways-to-secure-your-gmail-account\/438\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/4-ways-to-secure-your-gmail-account\/658\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/4-ways-to-secure-your-gmail-account\/658\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/calendar\/","name":"calendar"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=658"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/658\/revisions"}],"predecessor-version":[{"id":15085,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/658\/revisions\/15085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/663"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}