GOOGLE has revealed a list of ways to tell if your account has been compromised and tips on what to do next.
The tech giant offers support to users who suspect their accounts have been hacked through their online Help Center.
The most telltale sign is a red bar at the top of your screen that says, “We’ve detected suspicious activity on your account.”
But the company offers a bunch of other ways to tell if you’ve been hacked.
Google will provide notifications in most cases, including those related to an unusual login, a new device in your account, or changes to your username, password, or security settings.
But users are also encouraged to be proactive if they notice changes to their account information that they don’t remember to authorize.
Users should correct their settings immediately if they notice any unknown changes to their recovery phone number, recovery email address or alternate email addresses.
Other fields that may be affected are the name in your Google account, security questions, or location sharing questions.
The tech behemoth also urges users to take action if they notice changes to their two-step verification (2SV) methods.
Google’s 2SV provides an additional layer of security by requiring users to provide additional information during the login process.
This may include receiving a text code, providing verification in an authenticator app, or using biometric information such as a face scan to log in.
Two-step verification is turned on by default—if you don’t remember turning it off, that could be a sign you’ve been hacked.
Users are also encouraged to change their settings if they suspect other apps have gained unauthorized access to their accounts.
A feature called “less secure app access” is automatically turned off. It prevents apps and devices with less secure sign-in technology from accessing your Google Account.
If the setting is enabled, this may indicate that a malicious actor has logged into your account.
Unrecognized purchases on Google Pay can be a big red flag.
How to keep information safe online
Here’s what Mackenzie Tatananni, science and technology reporter at The US Sun, has to say.
It’s more important than ever to understand how your data is stored and shared.
While hackers can gain access to your accounts through brute-force attacks—simply by guessing your password until they get it right—it’s also possible for your information to circulate online.
Organizations such as banks and telecommunications companies store your information in digital databases. Sometimes, criminals access these databases in what is known as a data breach.
They can then share this sensitive information with the public. In fact, I’ve seen websites dedicated to sharing leaked data on the dark web.
Some tech companies, like Apple, will let you know if a saved password has surfaced in a data leak somewhere — but other times you might not know until it’s too late.
A useful (though not always up-to-date) tool is haveibeenpwned.com. Simply entering your email address reveals whether your information has been exposed, as well as the company or website it was obtained from.
Strong passwords are an essential part of keeping your data safe. Do not repeat passwords between websites. Make sure they are at least 12 characters long (but the longer the better). Use a combination of letters, numbers and symbols, if allowed. Dictionary words, names and other personal information such as birthdays are among the easiest for hackers to guess.
As always, use common sense. You may receive fraudulent emails and text messages asking you to share personal information. Be aware of the signs of a scam – agencies like the FTC and OFCOM have a wide range of tools that can keep you educated and informed.
The tech giant encourages users to remove bank accounts and cards, including gift cards, that have been accidentally linked to their Google Pay account without permission.
Users can report fraudulent charges to Google to receive a refund. It is also wise to contact your bank or credit card company.
If you think someone else has accessed your account, Google encourages you to change your password immediately.
This information should be updated on sites where you use the same password, as it may have been compromised. Be sure to change the information wherever it may be stored, including your browser.
Users are also required to identify and remove any unknown devices registered to their accounts.
The process is quite simple: Start by selecting “Security” in the left navigation panel within your Google Account.
In the “Your devices” panel, select “Manage devices”. This will show all devices that are currently logged in.
If you want to remove a device, click on the three dots in the upper right corner of the device tab.
Google also offers a Security Checkup tool that provides an overview of your account.
This feature displays your security settings and connected devices so you can REVIEW them and make any desired changes.