{"id":3778,"date":"2019-02-06T21:39:09","date_gmt":"2019-02-06T18:39:09","guid":{"rendered":"https:\/\/www.protectimus.com\/blog\/?p=3778"},"modified":"2023-11-06T21:26:51","modified_gmt":"2023-11-06T18:26:51","slug":"9-gmail-security-rules","status":"publish","type":"post","link":"https:\/\/www.protectimus.com\/blog\/9-gmail-security-rules\/","title":{"rendered":"9 Must Follow Gmail Security Rules"},"content":{"rendered":"<p><a name=\"1. Set a Strong Password for Your Gmail Account\"><\/a><\/p>\n\n\n<p>Gmail is perhaps the most used email service, with which people exchange terabytes of information daily. A typical account contains lots of personal details such as banking data, digital identities, passwords, trade agreements, etc. Unfortunately, despite the service&#8217;s popularity, positive reputation and constant effort of its creators, personal data is not protected enough. Besides hidden security mechanisms that work automatically, there is an array of optional measures that must be activated manually. Nevertheless, most of the latter are unknown to or ignored by the majority of users. Often it does not even take a professional hacker to exploit Google Gmail security vulnerabilities using the basic skills in <a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">social engineering<\/a>. In this article, we will talk about how to secure Gmail account by following the 9 simple rules.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>1. Set a Strong Password for Your Gmail Account and Change It Regularly<\/strong><\/h2>\n\n\n\n<p>The first thing you need to keep in mind when coming up with a password for your Gmail account is to never use anything personal, such as dates of birth (or any other memorable dates), nicknames, names of animals, etc. In general, everything that a person from your environment may know about you. It is better if it is a random set of letters (in varying case), numbers and special characters.<\/p>\n\n\n\n<p class=\"has-text-align-left\"><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/how-to-choose-and-use-strong-passwords\/\">How to Choose and Use Strong Passwords<\/a><\/p>\n\n\n\n<p>If you don\u2019t want to bother inventing such a strong password, just use one of many <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/passwordsgenerator.net\/\" target=\"_blank\">online generators<\/a>. And the newly created passwords can be stored in a special password manager (for example, such as <a href=\"https:\/\/www.lastpass.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">this<\/a>).<\/p>\n\n\n\n<p>If you want to change your account password right now, follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sign into your Google account and open the <a href=\"https:\/\/myaccount.google.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">homepage<\/a>;<\/li>\n\n\n\n<li>Go to &#8220;Security&#8221; page and click \u201cPassword\u201d in a Signing in to Google&#8221; block;<\/li>\n\n\n\n<li>Set a new password (you will need to enter the current password to confirm your identity first).<\/li>\n<\/ul>\n\n\n<p><a name=\"2. Turn the Two Factor Authentication On\"><\/a><\/p>\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/1-Gmail-security-change-password.png\" alt=\"How to change password in Gmail\" class=\"wp-image-3779\"><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\"><strong>2. Turn the Two Factor Authentication On<\/strong><\/h2>\n\n\n\n<p>Gmail two factor authentication is the method, which requires the user not only to carry out the standard authentication procedure (with credentials) but also confirm their identity by entering the one-time code that is generated at their mobile phone by a special app &#8211; <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.google.android.apps.authenticator2&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">Google Authenticator<\/a> or <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.android&amp;hl=en\" target=\"_blank\">Protectimus Smart OTP<\/a>.<\/p>\n\n\n\n<p>To enable the Gmail 2 factor authentication (2FA), follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sign into your Google account and open the <a href=\"https:\/\/myaccount.google.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">homepage<\/a>;<\/li>\n\n\n\n<li>Go to &#8220;Security&#8221; page and click \u201c2-Step Verification\u201d in a Signing in to Google&#8221; block;<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/2-Gmail-security-2-step-verification.png\" alt=\"How to setup 2-step verification in Gmail\" class=\"wp-image-3780\"><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Click the \u201cGET STARTED\u201d button at the bottom of the page and enter the current password to confirm your identity;<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"756\" height=\"719\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/3-Gmail-security-2-step-verification-get-started.png\" alt=\"How to setup 2-step authentication in Gmail\" class=\"wp-image-3781\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/3-Gmail-security-2-step-verification-get-started.png 756w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/3-Gmail-security-2-step-verification-get-started-300x285.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/3-Gmail-security-2-step-verification-get-started-610x580.png 610w\" sizes=\"auto, (max-width: 756px) 100vw, 756px\" \/><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<ul class=\"wp-block-list\">\n<li>Choose the desired 2-step verification option:\n<ol class=\"wp-block-list\">\n<li><strong>SMS or phone call authentication<\/strong>. You can link your phone number to the Google account and use SMS or phone call authentication.<\/li>\n\n\n\n<li><strong>Google Prompt<\/strong>. With Google Prompt you\u2019ll need only to tap one button on your smartphone to sign in. <em>Keep in mind that only those smartphones that are already connected to the same account can be chosen to receive Google Prompt messages.<\/em><\/li>\n\n\n\n<li><strong>Security key<\/strong>. Security keys are hardware 2-step verification devices that support FIDO standards. Google offers 2 types of security keys &#8211; USB Security Key and Bluetooth Security Key. Google sells both devices in one bundle. <em>You\u2019ll need to buy the security key bundle for $50 first.<\/em><\/li>\n\n\n\n<li><strong>Google Authenticator or another 2FA app<\/strong>. Google Authenticator is a <a href=\"https:\/\/www.protectimus.com\/blog\/10-most-popular-2fa-apps-on-google-play\/\">two-factor authentication app<\/a> where you can create software OTP tokens not only for Google account but for any other website supporting two-factor authentication. <em>To set up 2-factor authentication via Google Authenticator app you first have to add the phone number. You can remove the phone later on the <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/myaccount.google.com\/signinoptions\/two-step-verification\" target=\"_blank\">2-Step Verification Setting<\/a> page.<\/em><\/li>\n\n\n\n<li><strong>Hardware OTP token Protectimus Slim NFC<\/strong>. Contactless hardware OTP tokens <a href=\"https:\/\/www.protectimus.com\/slim-mini\/?ref=Gmail-security-article-1\">Protectimus Slim NFC<\/a> are the most secure alternative to Gmail authenticator. These tokens are absolutely immune to malware infection as they don\u2019t connect to any network or device. To set up Protectimus Slim NFC you need an Android smartphone with NFC support. A special application <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.protectimus.totpburner.nfc&amp;hl=en\" target=\"_blank\">Protectimus TOTP Burner<\/a> allows scanning the QR code with the secret key and flashing the token with this secret. It doesn\u2019t store the secret key and it\u2019s impossible to pull the secret out of the token. After the secret is added to the token it works absolutely autonomously. Learn how to add Protectimus Slim NFC to Google Account here. <\/li>\n<\/ol>\n<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Follow further instructions depending on the method you choose. You\u2019ll find detailed instructions on how to add two-factor authentication to Google account on our blog.<\/li>\n<\/ul>\n\n\n<p><a name=\"3. Setup the Access Recovery Methods\"><\/a><\/p>\n\n\n<p class=\"has-text-align-left\"><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/two-factor-authentication-types-and-methods\/\">The Pros and Cons of Different Two-Factor Authentication Types and Methods<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>3. Setup the Access Recovery Methods<\/strong><\/h2>\n\n\n\n<p>In order to secure email Gmail while at the same time protecting yourself from unnecessary fuss in case of access loss, configure the recovery methods. For this:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sign into your Google account and open the <a href=\"https:\/\/myaccount.google.com\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">homepage<\/a>;<\/li>\n\n\n\n<li>Go to &#8220;Security&#8221; page and find &nbsp;the block \u201cWays we can verify it&#8217;s you&#8221;;<\/li>\n\n\n\n<li>Assign a backup email address and phone number that would be used to restore access (you will need to enter the current password to confirm your identity first in both cases).<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1354\" height=\"287\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings.png\" alt=\"Gmail Access Recovery Methods\" class=\"wp-image-3802\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings.png 1354w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings-300x64.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings-768x163.png 768w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings-1024x217.png 1024w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/5-Gmail-security-2-recovery-settings-610x129.png 610w\" sizes=\"auto, (max-width: 1354px) 100vw, 1354px\" \/><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<p>We also suggest downloading backup codes for two-factor authentication. This is the list of one-time passwords allowing you to sign in when away from your phone, like when you\u2019re traveling or you lost the token. But remember, backup codes are as secure as a password written down on a paper. Be sure you saved them in a very secure place! To download the backup codes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open the <a href=\"https:\/\/myaccount.google.com\/signinoptions\/two-step-verification\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">2-Step Verification page;<\/a><\/li>\n\n\n\n<li>Find the section \u201cBackup codes\u201d and click \u201cSET UP\u201d;<\/li>\n\n\n\n<li>Download or print the backup codes;<\/li>\n\n\n\n<li>Save the file or a piece of paper with backup codes in the safest place possible.<\/li>\n<\/ul>\n\n\n<p><a name=\"4. Conduct the Google Security Checkup\"><\/a><\/p>\n\n\n<p class=\"has-text-align-left\"><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/google-authenticator-backup\/\">How to Backup Google Authenticator or Transfer It to a New Phone<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>4. Conduct the Google Security Checkup<\/strong><\/h2>\n\n\n\n<p>At this point, you need to run a full Google Gmail security checkup from your account\u2019s &#8220;<a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/myaccount.google.com\/u\/0\/security\" target=\"_blank\">Security<\/a>&#8221; tab. It consists of four steps, described below. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img loading=\"lazy\" decoding=\"async\" width=\"659\" height=\"441\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup.png\" alt=\"Google Security Checkup\" class=\"wp-image-3789\" srcset=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup.png 659w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup-300x201.png 300w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup-610x408.png 610w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup-321x214.png 321w, https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/02\/6-Gmail-security-checkup-140x94.png 140w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<h3 class=\"wp-block-heading\">Check Your Connected Devices<\/h3>\n\n\n\n<p>You can check your connected devices on <a href=\"https:\/\/myaccount.google.com\/u\/0\/security-checkup\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">Google Security Checkup<\/a> page. In the context of Google security, connected are those devices that are currently synchronized with your account. In order to make sure that no currently unused or foreign devices are connected, click the \u201cDon&#8217;t recognize a device?\u201d link to change the password and prohibit entry from suspicious gadgets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Check Recent Security Events<\/h3>\n\n\n\n<p>On the same <a href=\"https:\/\/myaccount.google.com\/u\/0\/security-checkup\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">Google Security Checkup<\/a> page, you can also check recent events that happened in your Google account. If you see something strange, it means that someone else could steal your password. Click the \u201cDon&#8217;t recognize an event?\u201d and change your password immediately.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Check Your 2-Step Verification Settings<\/h3>\n\n\n\n<p><a href=\"https:\/\/myaccount.google.com\/u\/0\/security-checkup\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">Google Security Checkup<\/a> page also allows you to review you two-factor authentication methods or add two-factor authentication to your Google account if you haven&#8217;t done it yet.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Check Your Account Permissions<\/h3>\n\n\n\n<p>When you sign up into third-party web services using the Google account, you automatically provide some information about yourself. Of course, this does not apply to your personal correspondence or personal data, but even those bits of information can theoretically be used against you by fraudsters. In order to prevent any counterfeit activity, we recommend that you carefully study the list of connected apps\/services and remove the suspicious ones. Be especially thorough about those services that are allowed access to Gmail sign in and security. Follow <a href=\"https:\/\/myaccount.google.com\/u\/0\/permissions\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">this link<\/a> to check your Google account permissions.<\/p>\n\n\n<p><a name=\"5. Review Your Gmail Security Settings Periodically\"><\/a><\/p>\n\n\n<p class=\"has-text-align-left\"><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/windows-computer-safety-tips\/\">Windows Computer Safety Tips<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>5. Review Your Gmail Security Settings Periodically<\/strong><\/h2>\n\n\n\n<p>In order to make sure that Gmail security works in an intended way, carefully review the Gmail settings pane.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">General Tab<\/h3>\n\n\n\n<p>This tab includes two potentially harmful options. The first option is &#8220;Signature&#8221;: make sure that it does not contain the text\/HTML-codes you did not input and suspicious links. The second option is &#8220;Vacation responder&#8221;. Check whether it is turned on or off (depending on your personal preferences) and that its contents carry the correct message.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Accounts and Import Tab<\/h3>\n\n\n\n<p>Here, three options should be checked:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&#8220;Send mail as&#8221; (ensure that all the entered addresses belong to you);<\/li>\n\n\n\n<li>&#8220;Check mail from other accounts&#8221; (also make sure that all the addresses in this list are yours);<\/li>\n\n\n\n<li>&#8220;Grant access to your account&#8221; (make sure that no suspicious addresses are on this list: the specified accounts can freely access your mail).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Filters and Blocked Addresses Tab<\/h3>\n\n\n\n<p>On this tab, check &#8220;The following filters are applied to all incoming mail&#8221; option. If you find any suspicious filters, deactivate them immediately.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Forwarding and POP\/IMAP Tab<\/h3>\n\n\n\n<p>Here you need to check three options:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&#8220;Forwarding&#8221; (make sure that your emails are not forwarded to someone else if you have not set this setting personally before);<\/li>\n\n\n\n<li>&#8220;POP download&#8221; (if you don&#8217;t use email clients, it should be disabled);<\/li>\n\n\n\n<li>&#8220;IMAP access&#8221; (similarly, by default this option should not be active).<\/li>\n<\/ul>\n\n\n<p><a name=\"6. Report Spam and Phishing letters, Block Suspicious Addresses\"><\/a><\/p>\n\n\n<p class=\"has-text-align-left\"><span style=\"color: #ff0000;\">| Read also:<\/span> <a href=\"https:\/\/www.protectimus.com\/blog\/email-hacking-protection\/\">Email hacking protection<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>6. Report Spam and Phishing letters, Block Suspicious Addresses<\/strong><\/h2>\n\n\n\n<p>If your email address is publicly accessible somewhere (for example, listed on your LinkedIn profile), it may become a target for <a href=\"https:\/\/www.protectimus.com\/blog\/7-tips-from-phishing-scams\/\">phishing<\/a> (that is, you can receive a message with a link that \u201csteals\u201d your authentication data, if you open it; as a rule, phishing messages are disguised as those sent by technical support from well-known services or social networks, such as Facebook). If you have received spam or phishing letter without requesting anything, do not open the link in it. Instead, follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open a suspicious message in Gmail;<\/li>\n\n\n\n<li>Click on the icon with the list of options at the top of the message (three vertical dots to the right of the &#8220;Reply&#8221; button;<\/li>\n\n\n\n<li>Select one of the options &#8211; \u201cReport phishing\u201d\/\u201dReport spam\u201d &#8211; depending on the message category.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><img decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/7-Gmail-report-phishing-spam.png\" alt=\"How to block phishing and spam letters in Gmail\" class=\"wp-image-3803\"><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<p>Moreover, network security experts strongly recommend that you ignore (or even better block) any email addresses from which the suspicious emails arrive. As a rule, they are placed into the &#8220;Spam&#8221; folder but even if this did not happen, carefully check the source from which the letter was received (and never follow any suspicious links).<\/p>\n\n\n\n<p>To block a specific email address, follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open a suspicious message in Gmail;<\/li>\n\n\n\n<li>Click on the icon with the list of options at the top of the message (three vertical dots to the right of the &#8220;Reply&#8221; button;<\/li>\n\n\n\n<li>Select the \u201cBlock\u201d option.<\/li>\n<\/ul>\n\n\n<p><a name=\"7. Regularly Update Your Browsers and Android Gmail App\"><\/a><\/p>\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter shadow-img\"><figure><img decoding=\"async\" src=\"https:\/\/www.protectimus.com\/blog\/wp-content\/uploads\/2019\/06\/8-Gmail-block-email-address.png\" alt=\"How to block suspicious email address in Gmail\" class=\"wp-image-3805\"><\/figure><\/figure><\/div>\n\n\n<p>&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\"><strong>7. Regularly Update Your Browsers and Android Gmail App<\/strong><\/h2>\n\n\n<p><a name=\"8. Encrypt Your Emails\"><\/a><\/p>\n\n\n<p>Try to keep track of updates to browsers you use to log into your Gmail account, as well as updates to mobile applications. In this case, you will be able to avoid vulnerabilities found in previous versions of software on time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>8. Encrypt Your Emails<\/strong><\/h2>\n\n\n<p><a name=\"9. Keep a Separate Email Account for Highly Sensitive Information\"><\/a><\/p>\n\n\n<p>You can use special extensions to encrypt your emails and, thus, protect your data from third-party interference. The most popular currently are <a rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.streak.com\/securegmail\" target=\"_blank\">Streak<\/a> and <a href=\"https:\/\/www.openpgp.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\" aria-label=\" (opens in a new tab)\">OpenPGP<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>9. Keep a Separate Email Account for Highly Sensitive Information<\/strong><\/h2>\n\n\n\n<p>To enhance the Gmail account security further, create a separate account for all the sensitive correspondence and never disclose it publicly or to unrelated parties. Thus, even if the scammers know your public mailing address, they will not receive information more than the one you are willing to share.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>Let&#8217;s summarize our brief \u201cHow to secure Gmail account\u201d tutorial. As you can see, it&#8217;s not so difficult to protect your own Gmail account, just stick to a small list of rules and regularly check the Gmail security settings:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"#1. Set a Strong Password for Your Gmail Account\">Set a Strong Password for Your Gmail Account and Change It Regularly<\/a><\/li>\n\n\n\n<li><a href=\"#2. Turn the Two Factor Authentication On\">Turn the Two Factor Authentication On<\/a><\/li>\n\n\n\n<li><a href=\"#3. Setup the Access Recovery Methods\">Setup the Access Recovery Methods<\/a><\/li>\n\n\n\n<li><a href=\"#4. Conduct the Google Security Checkup\">Conduct the Google Security Checkup<\/a><\/li>\n\n\n\n<li><a href=\"#5. Review Your Gmail Security Settings Periodically\">Review Your Gmail Security Settings Periodically<\/a><\/li>\n\n\n\n<li><a href=\"#6. Report Spam and Phishing letters, Block Suspicious Addresses\">Report Spam and Phishing letters, Block Suspicious Addresses<\/a><\/li>\n\n\n\n<li><a href=\"#7. Regularly Update Your Browsers and Android Gmail App\">Regularly Update Your Browsers and Android Gmail App<\/a><\/li>\n\n\n\n<li><a href=\"#8. Encrypt Your Emails\">Encrypt Your Emails<\/a><\/li>\n\n\n\n<li><a href=\"#9. Keep a Separate Email Account for Highly Sensitive Information\">Keep a Separate Email Account for Highly Sensitive Information<\/a><\/li>\n<\/ol>\n\n\n\n<p>And if you want to provide the highest possible level of Gmail security for your correspondence, order <a href=\"https:\/\/www.protectimus.com\/slim-mini\/?ref=Gmail-security-article-2\">Protectimus Slim NFC tokens<\/a> today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Read also:<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/how-to-protect-facebook-account-from-being-hacked\/\">How to Protect Facebook Account from Being Hacked<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/reddit-hacked\/\">Reddit was hacked: how it happened, who the victims were, and why SMS authentication failed<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/mitm-prevention-and-detection\/\">Man In The Middle Attack Prevention And Detection<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/social-engineering-why-it-works\/\">Social Engineering: What It Is and Why It Works<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.protectimus.com\/blog\/4-reasons-two-factor-authentication-isnt-a-panacea\/\">4 Reasons Two-Factor Authentication Isn\u2019t a Panacea<\/a><\/li>\n<\/ul>\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Gmail is perhaps the most used email service, with which people exchange terabytes of information daily. A typical account contains lots of personal details such as banking data, digital identities, passwords, trade agreements, etc. Unfortunately, despite the service&#8217;s popularity, positive reputation and constant effort of its creators, personal data is not protected enough. Besides hidden [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":4237,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[15],"tags":[202,118,443,441,230],"class_list":["post-3778","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-rd","tag-cybersecurity","tag-data-protection","tag-gmail","tag-google","tag-information-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/comments?post=3778"}],"version-history":[{"count":44,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3778\/revisions"}],"predecessor-version":[{"id":8632,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/posts\/3778\/revisions\/8632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media\/4237"}],"wp:attachment":[{"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/media?parent=3778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/categories?post=3778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.protectimus.com\/blog\/wp-json\/wp\/v2\/tags?post=3778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}