Like many people, your online life is likely to be heavily tied to Google, from Gmail to Google Calendar and YouTube. Your PC, phone, and tablet may connect to your Google Account. You may even have a Pixel or other Android phone that requires access to Google websites and services.
How can you, as a Google user, keep all the information in your account in check so nobody else can access it? Google itself is trying to help with Security Checkup, a website that displays your security settings and attached devices so you can review them and make any necessary changes.
Let's take a look at how this works on PC and mobile phone.
How to Run a Google Security Check
There are several ways to view the Google security review web site. Surf to a Google website using any browser, such as For example, the Google search page, Gmail, Google Calendar, Google Docs, or Google Play. Sign in with your Google Account when prompted. Click your profile photo or icon in the upper-right corner and select the Google Account button. Alternatively, you can take a more direct route by simply opening your Google Account Page .
You are now on the homepage for your Google Account. If Google detected any potential security issues, the Security section displays the following: "Security issues found." In this case, click the link to the secure account. If no issues are detected, the section says "We're protecting your account." In this case, click the Getting Started link if you still want to check the settings.
Google divides the possible security issues and items into specific areas categories: Your Devices, Recent Security Events, Third-Party Access, and Sign In and Restore. A yellow exclamation point next to a category indicates one or more potential issues. A green check mark is a sign of a clean state of health. However, you should continue to review all categories. Let's take a look at the individual.
Check attached devices
Select the category "Your Devices". This category displays all currently signed-in devices and devices that you have not used for a long time. For example, you may have an old Android phone or tablet that you may no longer own. To remove a device that you no longer use, click the Remove button.
Click to activate a device signed in to your Google Account, the ellipsis button () next to it. If you are unfamiliar with this device, click on the entry "Do not recognize this device?". Google will ask you to change your password. You can also simply remove the device from this menu.
If you change your password, you will need to log in to all devices again. As inconvenient as it sounds, you should choose this option if you think a device or password is in the wrong hands.
Review security events
On the Security Audit page, select the option from the Current Security Events category. In this category, recorded events are displayed. For example, sign in with your Google Account on certain devices and change passwords. Google identifies events that occur on different devices and prompts you to confirm that you have performed this action.
Answer the question whether or not you have taken these measures. If so, Google considers the action approved. If you do not recognize a device or recent event, let Google know about it. You will then be prompted to change your password.
Click View Other at the bottom of the Recent Security Events section to see all recent security events for your Google Account and devices. If one or more events are unknown, click the "Do not recognize events" link below. In that case, Google will ask you to change your password again.
Manage Third-Party Services
On the Security Check page, select the category for third-party access. This category will show a flag if you have enabled third-party services to access your Google Account. For example, if you set up access to Gmail through your e-mail software, it will be marked as third-party access.
If you're sure you're not using one Click the Turn Off button in Google services through a third-party app or account to disable this access type.
Otherwise, select Show Other to check each access type. Click the Remove Access button to disable access to items that you no longer use for a Google website or service.
Verifying Login and Recovery
On the Security Check page, select Sign In and Restore. If you have enabled two-factor authentication, you will probably see "2-step verification" instead.
Logging In and Restoring shows all of the recovery methods that you set up in case you've ever been expelled from your account. You may also see any trusted mobile devices that you can use to verify your identity.
To set or change your recovery phone number, click the pencil icon next to this entry. You will need to enter your Google password to change the number. Do the same with your recovery email, if necessary.
If you see trusted mobile devices that you want to remove, click the About icon for this entry. In the window, click on the "Recently used devices" link.
On the Recently Used Devices page, review each device to make sure you recognize it. If you find a device unknown, click on it to see more details, such as: For example, the Chrome version and the last used location. If you can not find the device or are suspicious of suspicious activity, click the link for This device lost? You can also remove the phone immediately by clicking Remove.
Google asks for your password and then forwards you to a page with events and other details about this device. Scroll down the page. If everything is ok, click the Looks Good button. Otherwise, click on the link for "Something looks wrong". Then you can change your Google password or try other options, such as: For example, trying to call the phone, log out, or contact your wireless service provider.
Then return to your Google Account page. You can find more settings by clicking on the Security entry on the left side of the screen. However, these are the key settings that help you better protect your Google Account and devices.