If you’ve just updated your recovery details, e.g. phone number or alternative email address, you will see the Security Check-Up window.
Recent security activity
This is a list of recent events, like changing your password; or your recovery phone number. Check that the location and date are at least more or less correct! If not, that is cause for concern.
Sign-In and recovery
Your recovery methods are listed: this is often a phone number and an alternative email address.
Third party access
This tells you which apps have access to your data. Make sure they are all low-risk ones, not high-risk ones; Google will tell you. (Please bear in mind also that absolute, unqualified cybersecurity is an absolute impossibility. Will you forbid all apps from having access; or low-risk ones only; or even the odd high risk one? Ultimately, it is up to you to do your research, and to try and make an informed decision).
Desktop computers, laptops, smartphones, etc.
But do look out for the blue writing: ‘don’t recognize a device?’ If you look like you’re logged in on a device that is not yours, make sure you click on the blue link, and try to find out what’s going on.
Well, that’s the end of this two-part article. Please continue to like and follow Glossy News, on our Facebook page. More IT articles will follow; and don’t forget, most of all, our hilarious satire!