GOOGLE has revealed a list of ways to tell if your account has been compromised and tips on what to do next.
The tech giant offers support to users who suspect their accounts have been hacked through their online Help Center.
The most telltale sign is a red bar at the top of your screen bearing the message, “We’ve detected suspicious activity in your account.”
But the company provides a slew of other ways to tell if you’ve been hacked.
Google will provide notifications in most cases, including those about an unusual sign-in, a new device on your account, or changes to your username, password, or security settings.
But users are also encouraged to be proactive if they notice changes to their account information that they don’t recall authorizing.
READ MORE ON CYBERSECURITY
Users should immediately correct their settings if they spot unfamiliar changes to their recovery phone number, recovery email address, or alternate email addresses.
Other areas that may be affected are the name on your Google Account, security questions, or location-sharing questions.
The tech behemoth also urges users to act if they spot changes to their two-step verification (2SV) methods.
Google’s 2SV provides an additional layer of security by requiring users to provide additional information during the sign-on process.
This may include receiving a text code, providing verification in an authenticator app, or using biometric information like a face scan to sign in.
Two-step verification is activated by default – if you don’t recall turning it off, this may be a sign you were hacked.
Users are also encouraged to change their settings if they suspect other apps have gained unauthorized access to their accounts.
A feature called “less secure app access” is automatically turned off. It prevents apps and devices with less secure sign-on technology from accessing your Google account.
If the setting is turned on, this may indicate that a malicious actor has signed into your account.
Unfamiliar purchases in Google Pay can be an enormous red flag.
How to keep information safe online
Here’s what Mackenzie Tatananni, Science and Technology Reporter at The U.S. Sun, has to say.
It is more important than ever to understand how your data is being stored and shared.
While hackers may gain access to your accounts through brute-force attacks – simply guessing your password until they get it right – it is also possible that your information is floating around online.
Organizations like banks and telecommunication companies store your information in digital databases. Sometimes, criminals access these databases in what is known as a data breach.
They may then share this sensitive information with the public. In fact, I have seen websites dedicated to sharing leaked data on the dark web.
Some tech companies, like Apple, will notify you if a saved password has appeared in a data leak somewhere – but other times you might not be aware until it is too late.
One helpful (though not always up to date) tool is haveibeenpwned.com. Simply inputting your email address shows if your information has been exposed, as well as the company or website it was taken from.
Strong passwords are an essential part of keeping your data secure. Don’t repeat passwords between websites. Make sure they are at least 12 characters long (but the longer, the better). Use a combination of letters, numbers, and symbols, if permitted. Dictionary words, names, and other personal information like birthdays are among the easiest f or hackers to guess.
As always, use common sense. You may receive fraudulent emails and text messages asking you to share personal information. Be aware of the signs of a scam – agencies like the FTC and OFCOM have a wide array of tools that can keep you educated and informed.
The tech giant encourages users to remove bank accounts and cards, including gift cards, that have suddenly been linked to their Google Pay account without permission.
Users can report fraudulent charges to Google in order to get a refund. It is also wise to contact your bank or credit card company.
If you think someone else signed into your account, Google encourages you to change your password immediately.
This information should be updated on sites where you use the same password, as it may have been compromised. Be sure to change the information anywhere it may have been saved, including your browser.
Users are also urged to identify and remove any unfamiliar devices signed into their accounts.
The process is fairly simple: Begin by selecting “Security” on the left navigation panel inside your Google account.
On the “Your devices” panel, select “Manage devices.” This will show all the devices that are currently signed in.
If you wish to remove a device, click on the three dots at the top right corner of the device tab.
Google also offers a Security Checkup tool that provides an overview of your account.
This function displays your security settings and connected devices so that you can review them and make any desired changes.