Tools and tips to help you
stay safe online.
We automatically protect your privacy with industry-leading security. There are a few additional steps you can take to manage your online security and choose the right level of protection for you.
of your Google Account.
Security Checkup
Take the Security Checkup
One easy way to protect your Google Account is to take the Security Checkup. This step-by-step tool gives you personalized and actionable recommendations to help strengthen the security of your Google Account.
2-STEP VERIFICATION
Defend against hackers with 2‑Step Verification
2-Step Verification helps keep out anyone who shouldn’t have access to your account by requiring you to use a secondary factor on top of your username and password to log in to your account. For those who are at risk of targeted online attacks and need even stronger protections, we’ve created the Advanced Protection Program.
your passwords.
Use strong and unique passwords
Creating a strong, unique password for every account is one of the most critical steps you can take to protect your privacy. Using the same password to log in to multiple accounts, like your Google Account, social media profiles, and retail websites, increases your security risk.
Keep track of all your passwords
A password manager, like the one built into your Google Account, helps protect and keep track of the passwords you use on sites and apps. Google’s Password Manager helps you create, remember, and securely store all your passwords to safely and easily sign in to your accounts.
Check your passwords for security issues
Check the strength and security of all of your saved passwords with a quick Password Checkup. Learn if any of your saved passwords for third-party sites or accounts have been compromised, and easily change them if needed.
-
Lock down your phone if you lose it
If your phone is ever lost or stolen, you can visit your Google Account and select “Find your phone” to protect your data in a few quick steps. Whether you have an Android or iOS device, you can remotely locate and lock your phone so that no one else can use your phone or access your personal information.
-
Maintain up-to-date software
Review the software you use regularly to make sure you are always running the latest version available. Some services, including the Chrome browser, can update automatically so you have the latest security features and fixes.
-
Block potentially harmful apps from your phone
We take care of your device with Google Play Protect, Google’s built-in malware protection for Android, but you should always download your mobile apps from a source you trust. To keep your data protected, review your apps and delete ones you don’t use, enable app auto-updates, and limit app access to sensitive data like your location and photos.
-
Use a screen lock
When you are not using your computer, laptop, tablet, or phone, lock your screen to keep others from getting into your device. For added security, set your device to automatically lock when it goes to sleep.
-
Use secure networks
Be careful about using public or free Wifi, even if it requires a password.These networks may not be encrypted, so when you connect to a public network, anyone in the vicinity may be able to monitor your internet activity, such as the websites you visit and the information you type into sites. If public or free wifi is your only option, the Chrome browser will let you know in the address bar if your connection to a site is NOT secure.
Watch this video to learn more about the importance of using secure Wi-Fi connections, and for tips on how to secure your own Wi-Fi network.
-
Ensure your connection is secure before entering sensitive information
When you are browsing the web – and especially if you plan to enter sensitive information like a password or credit card number – make sure the connection to the sites you visit is secure. The default state of any connection is secure. If the connection is not secure, the Chrome browser will display a red Not Secure chip in the address bar. HTTPS helps keep your browsing safe by securely connecting your browser or apps with the websites you visit.
-
Google Location Accuracy
Google Location Accuracy uses publicly broadcast Wi-Fi data from wireless access points and GPS, cell tower, and sensor data to improve location services. For instructions on how to opt out your wi-fi access point from being collected, learn more here.
phishing attempts
Know how scammers might reach you
Scammers can take advantage of goodwill by disguising their scams as legitimate messages. Alongside emails, scammers may also use text messages, automated calls, and malicious websites to exploit you.
Always validate suspicious URLs or links
Phishing is an attempt to trick you into revealing critical personal or financial information, like a password or bank details. It can take many forms, such as a fake login page. To avoid getting phished, never click on questionable links; double-check the URL — by hovering over the link or long-pressing the text on mobile — to make sure the website or app is legitimate; and make sure the URL begins with “https.”
Watch out for impersonators
Scammers might pose as legitimate organizations like the government or nonprofits. Always proceed with caution when reading messages from someone claiming to be an authoritative resource. If someone you know emails you but the message seems odd, their account may have been hacked. Don’t reply to the message or click any links unless you can confirm the email is legitimate. Look out for things like urgent requests for money, sob stories about being stranded abroad, or the person claiming their phone was stolen and cannot be called.
Beware of email scams or requests for personal information
Messages from strangers can be suspect, and even a communication from someone you trust, like your bank, might be an impersonation. Don't reply to suspicious emails, instant messages, or pop-up windows that ask for personal information. Never click suspicious links or enter personal information in questionable forms or surveys. If asked for a nonprofit donation, go directly to the organization's website to donate rather than clicking on the link sent to you.
Double-check files before downloading
Some sophisticated phishing attacks can occur through infected documents and PDF attachments. If you come across a suspicious attachment, use Chrome or Google Drive to open it. We’ll automatically scan the file and warn you if we detect a virus.
keep you safe online.