Управление настройками безопасности пользователей

Содержание:

Step 5: Protect against suspicious messages & content

Avoid suspicious requests

  • Never give out your passwords. Google will never ask for your password in an email, message, or phone call.
  • Don’t reply to suspicious emails, texts, instant messages, webpages, or phone calls that ask for your personal or financial info.
  • Don’t click links in emails, messages, webpages, or pop-ups from untrustworthy websites or senders.

Avoid suspicious emails

  • Check if a Gmail message might be fake.
  • See if the email address and the sender name match.
  • If you get a suspicious email in Gmail, report spam or  to help us stop similar emails in the future.
  • to make sure there’s no unfamiliar activity.

Tip: If you’re using Gmail on your computer, point to a link without clicking on it. At the bottom left, look at the web address and make sure it’s what you expect.

Avoid suspicious web pages

Google Chrome and Search are designed to warn you about suspicious content and unwanted software.

Learn how to manage these warnings in Chrome and Search.

Use your phone

To quickly and securely confirm it’s you, have a mobile device or security key available that’s registered to your account for 7 days or more. You can use:

  • The phone with the recovery phone number for your account
  • A phone or tablet that’s signed in to your Google Account. .
  • A security key that’s been added to your Google Account.

Tip: If you have a Google Account through work, you may be asked to verify it’s you with your corporate device.
 

If you’re asked to verify it’s you, follow the steps below. Have your phone nearby, and if possible, make sure it’s connected to the internet.

  1. On the «Verify it’s you» screen, complete the task or select More ways to verify. You’ll have some or all of these options:

    • Get a prompt sent to your phone
    • Get a verification code by text
    • Get a verification code by phone call
    • Get a security code on your Android device
    • Use your screen lock or fingerprint on your Android device
    • Use a security key that’s been added to your Google Account
  2. Follow the on-screen instructions and use your phone when prompted.

Chrome privacy policies

You can disable these policies to prevent information your users enter in Chrome from being sent to Google.

Form autofill 

Disable this policy to prevent Chrome from saving information users enter in forms, such as names, addresses, and phone numbers.

Enforce from:

  • Admin console—
  • Windows Group Policy—Enable AutoFIll
  • Mac, Linux preference name—AutoFillEnabled 

Policy details for Windows, Mac, and Linux AutoFillEnabled

Google Translate

Disable this policy to prevent Chrome from offering page translations in languages that are not specified in a user’s Language settings.  

Enforce from:

  • Admin console—
  • Windows Group policy—Enable Translate
  • Mac, Linux preference name—TranslateEnabled

Policy details for Windows, Mac, and Linux TranslateEnabled

Metrics reporting

Disable this policy to prevent Chrome from reporting usage metrics, crash reports, and other diagnostic data back to Google.

Enforce from:

  • Admin console—
  • Windows Group Policy—Enable reporting of usage and crash related data
  • Mac, Linux preference name—MetricsReportingEnabled

Policy details for Windows, Mac, and Linux: MetricsReportingEnabled

Password manager

Disable this policy to prevent Chrome from saving users’ passwords.

Enforce from:

  • Admin console—
  • Windows Group policy—Enable saving passwords to the password manager
  • Mac, Linux preference name—PasswordManagerEnabled

Policy details for Windows, Mac, and Linux PasswordManagerEnabled

Search suggestions

Disable this policy to prevent Chrome from using a prediction service to help complete web addresses or search terms, when users type in the address bar.

Enforce from:

  • Admin console—
  • Windows Group policy—Enable search suggestions
  • Mac, Linux preference name—SearchSuggestEnabled

Policy details for Windows, Mac, and Linux SearchSuggestEnabled

Spell check

Disable this policy to prevent Chrome from using Google’s online spell-checking service to suggest spelling corrections on corporate devices.

Enforce from:

  • Admin console: 
  • Windows Group policy: Enable or disable spell checking web service
  • Mac, Linux preference name: SpellCheckServiceEnabled

Policy details for Windows, Mac, and LinuxSpellCheckServiceEnabled

Step 1: Do a Security Checkup

Go to Security Checkup to get personalized security recommendations for your Google Account, including:

Add or update account recovery options

  • Block someone from using your account without your permission
  • Alert you if there’s suspicious activity on your account
  • Recover your account if you’re ever locked out

Turn on 2-Step Verification

2-Step Verification helps prevent a hacker from getting in to your account, even if they steal your password. To avoid common phishing techniques associated with text message codes, choose a stronger second verification step:

  • Security keys (Most secure verification step)
  • Google Prompts (More secure than text message codes)

Increased security: Advanced Protection

If you’re a journalist, activist, or someone else at risk of targeted online attacks, consider enrolling in the Advanced Protection Program for a higher level of security. Advanced Protection uses security keys to protect against phishing and includes other protections like blocking unsecure apps.

Remove risky access to your data

Consider removing account access for any non-essential apps to better protect sensitive information.

  • Manage apps with access to your account and learn more about the risks.
  • Turn off access for apps that use less secure sign-in technology.

Turn on screen locks

Screen locks help protect your devices from being used without your permission. Learn how to set screen locks on an Android device.

Note: For info on adding a screen lock on other devices and computers, visit the manufacturer’s support site.

Find out if your Google Account has been hacked

If you notice any of these signs, someone else may be using your Google Account.

Important: If you think someone else is signed in to your Google Account, change your password immediately for:

  • Your Google Account, if you didn’t change it already
  • Apps and sites:
    • That you use the same password you used for your Google Account
    • That contact you through your Google Account email address
    • Where you sign in with your Google Account email address
    • Where you saved passwords in your Google Account

You can then check for and remove any unfamiliar devices signed in to your account.

Suspicious account activity

Unfamiliar changes to critical security settings

Correct the setting immediately if you see unfamiliar changes to these settings:

  • Your recovery phone number.
  • Your recovery email address.
  • An alternate or contact email address.
  • The name on your Google Account.
  • Your security question. 
  • Apps with access to your account.
  • If this setting was turned on or off without your knowledge:

    • 2-Step Verification 
    • Less secure app access
  • 2-Step Verification methods. 
  • Location Sharing.

Unauthorized financial activity

Your financial activity might be suspicious if:

  • On Google Pay

    • You don’t recognize purchases: To request a refund, report unauthorized charges.
    • You don’t recognize one or more bank accounts, credit cards, debit cards, or gift cards: Remove a payment method you don’t recognize
  • On Google Play, you don’t recognize purchases: Report unauthorized charges.
  • On Google Chrome, payment info you don’t recognize is set up: Delete unfamiliar payment info.
  • On Google Ads, you notice unauthorized charges or ads: Ask the Google Ads team to review your account for unusual activity.
  • On Google AdSense, you notice that payments aren’t going to the correct bank account: Check your AdSense payment method.

Unusual activity notifications

We’ll inform you of unusual activity through:

  • A notification about an unusual sign-in or a new device on your account.
  • A notification that there was a change to your username, password, or other security settings, and you didn’t make the change.
  • A notification about some other activity you don’t recognize.
  • A red bar at the top of your screen that says, «We’ve detected suspicious activity in your account.»
  • Your «» page.

Gmail settings

Correct the setting immediately if you see unfamiliar changes to:

  • Mail delegation: People with access to your Gmail
  • Automatic mail forwarding
  • Scheduled emails
  • Your name in Gmail
  • Automatic reply: Vacation responder
  • Address on outgoing mail
  • Blocked email addresses
  • Remote access to your Gmail: IMAP or POP
  • Filters that manage your incoming mail
  • Labels that organize your incoming mail

Gmail activity

Your Gmail activity might be suspicious if:

  • You no longer receive emails.
  • Your friends say they got spam or unusual emails from you.
  • Your username has been changed.
  • Your emails were deleted from your inbox and aren’t found in «Trash». You can report missing emails and possibly recover them.
  • You find «Sent Emails» that you didn’t write.

YouTube

Your YouTube activity might be suspicious if:

  • Your YouTube channel has videos you didn’t upload, comments you didn’t make, or unfamiliar changes to your:

    • Profile photo
    • Descriptions
    • Email settings
    • Sent messages

Google Drive

Your Google Drive activity might be suspicious if:

  • You find Google Drive activity that you don’t recognize.
  • Files were deleted from your Drive without your knowledge. You can try to recover your files.

Google Photos

Your Google Photos activity might be suspicious if:

  • Your without your permission.
  • Your photos are shared with a partner, and you didn’t add a partner account.

Blogger

Your Blogger activity might be suspicious if:

  • Posts you didn’t publish appear on your blog.
  • You get comments on posts you didn’t publish.
  • Your mail-to-Blogger address has changed, but you didn’t change it.
  • Your blog disappeared or was blocked.

Google’s vulnerability disclosure policy

We believe that vulnerability disclosure is a two-way street. Vendors, as well as
researchers, must act responsibly. This is why Google adheres to a 90-day disclosure
deadline. We notify vendors of vulnerabilities immediately, with details shared in public
with the defensive community after 90 days, or sooner if the vendor releases a fix. That
deadline can vary in the following ways:

  • If a deadline is due to expire on a weekend or US public holiday, the deadline will be
    moved to the next normal work day.
  • Before the 90-day deadline has expired, if a vendor lets us know that a patch is
    scheduled for release on a specific day that will fall within 14 days following the
    deadline, we will delay the public disclosure until the availability of the patch.
  • When we observe a previously unknown and unpatched vulnerability in software under
    active exploitation (a “0day”), we believe that more urgent action—within 7 days—is
    appropriate. The reason for this special designation is that each day an actively exploited
    vulnerability remains undisclosed to the public and unpatched, more devices or accounts
    will be compromised. Seven days is an aggressive timeline and may be too short for some
    vendors to update their products, but it should be enough time to publish advice about
    possible mitigations, such as temporarily disabling a service, restricting access, or
    contacting the vendor for more information. As a result, after 7 days have elapsed without
    a patch or advisory, we will support researchers making details available so that users can
    take steps to protect themselves.

As always, we reserve the right to bring deadlines forwards or backwards based on extreme
circumstances. We remain committed to treating all vendors strictly equally. Google expects
to be held to the same standard.

This policy is strongly in line with our desire to improve industry response times to
security bugs, but also results in softer landings for bugs marginally over deadline. We
call on all researchers to adopt disclosure deadlines in some form, and feel free to use
our policy verbatim if you find our record and reasoning compelling. Creating pressure
towards more reasonably-timed fixes will result in smaller windows of opportunity for
blackhats to abuse vulnerabilities. In our opinion, vulnerability disclosure policies such
as ours result in greater overall safety for users of the Internet.

Protect against suspicious messages & content

Phishing is when a hacker disguises themself as someone trustworthy to take personal information, like financial data, a national ID/social security number, or credit card numbers.

Avoid suspicious requests

  • Don’t reply to suspicious emails, texts, instant messages, webpages, or phone calls that ask for your personal or financial info.
  • Don’t click links in emails, messages, webpages, or pop-ups from untrustworthy websites or senders.
  • YouTube emails only come from @youtube.com or @google.com addresses.

Avoid suspicious web pages

Google Chrome and Search are designed to warn you about suspicious content and unwanted software.

Learn how to manage these warnings in Chrome and Search.

Report spam or phishing

To protect yourself against phishing, never enter your password on any page except myaccounts.google.com. If you find videos on YouTube that you think might be spam or phishing, please flag them for review by the YouTube team. For more information on spam and phishing please visit the National Cyber Security Alliance.

Tip: Learn more about phishing with our phishing quiz.

Set & check permissions on your channel

If you’re a creator, you can invite someone else to manage your YouTube channel without giving access to your Google Account. Invite someone to access their channel as a:

  • Manager: Can add or remove others and edit channel details.
  • Editor: Can edit all channel details. 
  • Viewer: Can view (but not edit) all channel details. 
  • Viewer (limited): Can view (but not edit) all channel details except revenue information. 

Note: If you have a Brand account, you can invite someone to manage your Google account and your YouTube channel. Learn to see if you have a Brand account and learn how to manage Brand account permissions.

Вопросы о продуктах Google

Можно ли пользоваться сервисами Google?Вы сможете входить в свой аккаунт в приложениях Google, а из браузеров – только в Chrome (на компьютере и мобильных устройствах). Аккаунт Google будет недоступен в некоторых приложениях и сервисах, которым требуется доступ к вашим конфиденциальным данным, например сообщениям электронной почты или данным Google Диска.
Можно ли использовать функцию «Войти с аккаунтом Google»?

Вы сможете входить в приложения и сервисы с аккаунтом Google. Доступ к данным Gmail или Google Диска будет запрещен.

Совет. Чтобы открыть доступ к данным Gmail или Google Диска некоторым , можно использовать .
Можно ли использовать Дополнительную защиту на устройстве Nest?

Да, устройства Nest работают с аккаунтами Google, в том числе с теми, которые зарегистрированы в программе Дополнительной защиты. Чтобы управлять всеми устройствами Google Nest и Google Home стало ещё удобнее, вы можете перенести данные из аккаунта Nest в аккаунт Google.

Информацию о конфиденциальности устройств и сервисов умного дома, подключенных к Google Nest, можно найти в Справочном центре.

Как усилить защиту при добавлении администраторов

Чтобы обеспечить безопасность устройств Google Nest и Google Home, следуйте советам ниже.

Добавляйте в качестве администраторов только тех пользователей, которым доверяете

Обратите внимание на следующее:
У всех администраторов есть доступ к устройствам, медиасервисам, адресам и действиям в доме.
Администраторы могут добавлять в дом новые устройства.
Администраторы могут добавлять и удалять других администраторов, в том числе вас. При добавлении нового администратора всем остальным приходит уведомление по электронной почте.

Если вы зарегистрировали свой аккаунт Google в программе Дополнительной защиты, мы настоятельно рекомендуем остальным администраторам тоже присоединиться к ней

В этом случае аккаунты Google всех администраторов, а также сервисы и устройства умного дома будут одинаково защищены от несанкционированного доступа.

Fix problems

Your phone isn’t signed in

To sign in to your Google Account on your phone:

  1. On your Android device, open the Settings app .
  2. Tap Users & accounts Add account .
  3. Follow the on-screen instructions.

You can’t use your phone

Your Android device is offline

If your phone isn’t connected to the internet, you can still use it to verify it’s you.

  1. On the Google sign-in page, enter your username and password as usual.
  2. If you get the «Verify it’s you» screen, select More ways to verify Get a security code on your Android phone.
  3. Follow the on-screen instructions.

Learn more about how to get a security code on your Android device.

Your phone isn’t available

If you can’t use your phone or your account doesn’t have a recovery phone number, you might still be able to verify it’s you.

  1. On the Google sign-in page, enter your username and password as usual.
  2. If you get the «Verify it’s you» prompt, select Try another way to sign in Can’t use your phone?
  3. If you get a list of options to confirm it’s you, select one and follow the on-screen instructions. 

If you get the «Security check» screen, you can’t verify it’s you without your phone right now. Learn other .

You don’t get a phone prompt

If you don’t get a prompt within a few minutes:

  1. Make sure your phone is connected to the internet. To get prompts, you need Wi-Fi or mobile data turned on.
  2. Confirm that you’re .
  3. Go to the sign-in screen and tap Resend.

If you still don’t get a prompt, tap Try another way and select a different option.
You don’t get a text or phone call

If you don’t get a text or phone call within a few minutes:

  1. Be sure the phone number digits you have are right.
  2. Make sure you have a strong network signal or that the phone is connected to Wi-Fi.
  3. Go to the sign-in screen and select Resend.
  4. If you still don’t get a text or phone call, select More ways to verify Get a security code on your Android phone.
  5. Follow the on-screen instructions.

Learn more about how to get a security code on your Android device.
You still can’t verify it’s you

If you aren’t able to sign in or complete an action, you can try again from:

  • A computer, phone, or tablet where you frequently sign in
  • The location where you usually sign in, like at home or work
  • The browser that you use most often, like Chrome or Safari

Tip: If you try again after 7 days or more, you may be able to verify it’s you.

You don’t get the option to verify it’s you

To protect your account, you may be blocked from taking a sensitive action when:

  • There’s no trusted device associated with your account.
  • There’s something different about how you use your account, such as from a new location or device.

If you don’t get the option to verify it’s you, you can:

  • Stay signed in to your Google Account on your Android phone for 7 days or more. Then, try the action again.
  • If your phone doesn’t run Android, add a recovery phone number to your Google Account and wait 7 days or more. Then, try the action again.

Step 3: Use unique, strong passwords

It’s risky to use the same password on multiple sites. If your password for one site is hacked, it could be used to get in to your accounts for multiple sites.

Make sure to create a strong, unique password for each account.

Manage your passwords

A password manager can help you generate and manage strong, unique passwords. Consider using one from Chrome or another trusted password manager provider.

Tip: To find out if any passwords saved in your Google Account may be exposed, are weak, or are reused for multiple accounts, you can use Password Checkup.

Help protect your password from hackers

To get notified if you enter your Google Account password on a non-Google site, turn on Password Alert for Chrome. That way, you’ll know if a site is impersonating Google, and you can change your password if it gets stolen.

Note: for an extra layer of account security.

Step 3: Take more security steps

Turn on 2-Step Verification

2-Step Verification helps keep hackers out of your account. With 2-Step Verification, you sign in with:

  • Something you know (your password)
  • Something you have (your phone, a security key, or a printed code)

That way, if your password is stolen, your account is still secure.

Contact your bank or local authorities

Make sure someone else didn’t give your bank or government instructions, like to open an account or transfer money. This is important if you:

  • Have banking info saved in your account, like credit cards saved in Google Pay or Chrome.
  • Have personal info like tax or passport info saved in your account. For example, you might have personal info saved in Google Photos, Google Drive, or Gmail.
  • Think someone is using your identity or impersonating you.

Remove harmful software

If you think your account has suspicious activity, you might need to remove harmful software. To improve your account’s security, install and run trusted anti-virus software.

You can also reset your computer to its factory settings and reinstall the operating system.

Important: Make sure to back up the files you need. Learn how to upload files to Google Drive.

Install a more secure browser

Some internet browsers have security weaknesses. Consider using a more secure browser, like Google Chrome.

Help prevent password theft with Password Alert

If you enter your password on a non-Google site, Password Alert on Google Chrome notifies you. That way, you’ll know if a site is pretending to be Google to steal your password.

Help secure your apps and devices

  • If access for less secure apps is turned on, we strongly suggest turning it off since it may make your account less secure.
  • Use your device’s screen lock option if it has one.

Help secure other Google products you use

  • Gmail: Review these security tips, and remove any labels, filters, or forwarding rules you didn’t set up.
  • Chrome: Uninstall extensions you don’t recognize, and update Chrome to the latest version.
  • Google Drive: Review your activity and file versions for anything unusual.
  • Google Photos: If you see album sharing you don’t recognize, stop sharing the album.
  • Location: Turn off Location Sharing that looks unusual.

What to consider before giving access

  • How secure is this site or app? If the third-party app’s server is hacked, your data may be accessed by unauthorized people. When you allow third-party apps to access your Google Account, they can copy and save your data on their own servers. Because Google can’t protect the data on another company’s servers, your data may be subject to greater data security and privacy risks.
  • How will this site or app use my data? The data may be used by the app in ways that are not obvious, such as being shared with others.
  • Can I delete my data from this site or app? Depending on the app, you may not be able to quickly or automatically delete your data from their servers. It may also be difficult to delete the account you created on the app.
  • Will this site or app tell me if something changes? The site or app may not directly notify you if it changes its policies and practices.
  • Who else can see my data on this site or app? Some third parties may have individuals who look at your Google Account information, including emails you write or your contacts.

Create a strong password & keep it safe

Create a strong password

A strong password helps you keep your personal information safe and prevents someone else from getting into your account. 

Create a strong and complex password: Use 8 characters or more. It can be any combination of letters, numbers, and symbols.

Make your password unique: Do not use your YouTube account password on other sites. If another site gets hacked, the password could be used to enter your YouTube account.

Avoid personal information and common words: Do not use personal information like your birthdays, common words like “password,” or common patterns like “1234.”

Protect your password from hackers

Get notified when you enter your password on a non-Google site by turning on Password Alert for Chrome. For example, you’ll be notified if you enter your password on a site that impersonates Google, and then you can change your YouTube account password.

Manage your passwords

A password manager can help you create and manage strong, unique passwords. Try using Chrome’s or another trusted password manager.

Tip: To find out if any passwords saved in your Google Account may be exposed, are weak, or are reused for multiple accounts, use Password Checkup.

Do a regular security checkup

Go to the Security Checkup page to get personalized security recommendations for your account and follow these tips to make your account more secure.

Add or update account recovery options

  • Block someone from using your account without your permission
  • Alert you if there’s suspicious activity on your account
  • Recover your account if you’re ever locked out

Turn on 2-Step Verification

2-Step Verification helps prevent a hacker from getting into your account, even if they steal your password. Here are your options: 

  • Security keys (Most secure verification step)
  • Google Prompts (More secure than text message codes)
  • Google Authenticator Application (Receive codes without internet or mobile data)

Security keys are a stronger verification option because they help prevent phishing techniques that use text message codes.

Turn on 2-Step Verification for your account.

Remove suspicious people from your account 

If you don’t recognize the people managing your account, your account may have been hacked, and someone is verifying ownership of your account to gain something. You can change or remove people depending on your account type.

  • Change or remove access from your YouTube Account
  • Change or remove access from your Brand Account

Remove sites and apps you don’t need

To protect your YouTube account, avoid installing unknown apps or apps from unknown sources. Manage and remove any apps you don’t need from your connected accounts.

Update your software and backup your account

If your browser, operating system, or apps are out-of-date, the software might not be safe from hackers. Keep your software updated and backup your account regularly.

Protect against suspicious messages & content

Phishing is when a hacker disguises themself as someone trustworthy to take personal information, like financial data, a national ID/social security number, or credit card numbers.

Avoid suspicious requests

  • Don’t reply to suspicious emails, texts, instant messages, webpages, or phone calls that ask for your personal or financial info.
  • Don’t click links in emails, messages, webpages, or pop-ups from untrustworthy websites or senders.
  • YouTube emails only come from @youtube.com or @google.com addresses.

Avoid suspicious web pages

Google Chrome and Search are designed to warn you about suspicious content and unwanted software.

Learn how to manage these warnings in Chrome and Search.

Report spam or phishing

To protect yourself against phishing, never enter your password on any page except myaccounts.google.com. If you find videos on YouTube that you think might be spam or phishing, please flag them for review by the YouTube team. For more information on spam and phishing please visit the National Cyber Security Alliance.

Tip: Learn more about phishing with our phishing quiz.

Set & check permissions on your channel

If you’re a creator, you can invite someone else to manage your YouTube channel without giving access to your Google Account. Invite someone to access their channel as a:

  • Manager: Can add or remove others and edit channel details.
  • Editor: Can edit all channel details. 
  • Viewer: Can view (but not edit) all channel details. 
  • Viewer (limited): Can view (but not edit) all channel details except revenue information. 

Note: If you have a Brand account, you can invite someone to manage your Google account and your YouTube channel. Learn to see if you have a Brand account and learn how to manage Brand account permissions.

Шаг 3. Защитите аккаунт

Чтобы защитить свой аккаунт от посторонних, следуйте инструкциям ниже.

Защитите данные и аккаунты от посторонних

Не доверяйте подозрительным письмам, сообщениям и звонкам

Злоумышленники могут отправлять вам письма и сообщения или звонить по телефону, выдавая себя за официальных лиц, членов вашей семьи или коллег.

Не отвечайте на подозрительные запросы

  • Никому не сообщайте свои пароли. Google никогда не запрашивает пароли пользователей в письмах, сообщениях или звонках.
  • Не вводите личные или финансовые данные на подозрительных сайтах и не отвечайте на подозрительные письма, сообщения или звонки с такими запросами.
  • Не переходите по ссылкам в письмах и сообщениях от ненадежных отправителей, во всплывающих окнах или на страницах ненадежных сайтов.

Совет. В Gmail можно навести курсор на ссылку, чтобы проверить полный адрес сайта.

Как распознать подозрительные письма

  • Проверьте подлинность письма в Gmail.
  • Проанализируйте заголовок сообщения.
  • и убедитесь, что больше ни у кого нет доступа к вашей почте.
  • Если вы получили подозрительное письмо в Gmail, отметьте его как спам.

Используйте защищенное подключение

Злоумышленники используют поддельные сайты и общедоступные сети Wi-Fi для кражи личной информации.

Проверяйте адреса сайтов

Злоумышленники могут создавать поддельные сайты, очень похожие на настоящие

Соблюдайте осторожность, открывая ссылки в подозрительных письмах, сообщениях или на ненадежных сайтах

Прежде чем ввести личные данные на сайте, проверьте следующее:

  • В адресной строке указан правильный адрес.
  • Адрес начинается с префикса «https», а не «http». Буква «s» (от англ. secure – «защищенный») означает, что сайт лучше защищен от перехвата данных. Однако полную безопасность гарантировать нельзя.

Не вводите личные данные в общедоступной сети Wi-Fi

Злоумышленники могут перехватить информацию, которую вы передаете в общедоступной сети Wi-Fi. Не вводите следующие данные:

  • пароли;
  • номера банковских счетов;
  • номера личных документов.

Создайте надежный пароль для домашней сети Wi-Fi

К некоторым устройствам прилагаются пароли для быстрой настройки, которые могут узнать злоумышленники.

Задавая пароль для домашней сети Wi-Fi, следуйте инструкциям интернет-провайдера или производителя маршрутизатора.

Подробнее о надежных паролях…

Защитите аккаунты и устройства

Злоумышленники могут получить доступ к данным, если вы используете простые пароли, устанавливаете одинаковые пароли для нескольких аккаунтов или не блокируете экраны устройств. Чтобы повысить безопасность аккаунтов, следуйте инструкциям ниже.

Создайте надежный пароль для каждого аккаунта

  • Пароли должны быть уникальными. Если в разных аккаунтах они одинаковые, то, узнав один пароль, злоумышленники получат доступ и к другим аккаунтам.
  • Составляйте пароль из заглавных и строчных букв, цифр и других символов.
  • Не используйте личную информацию, которая может быть известна другим.
  • Избегайте распространенных слов и фраз или простых сочетаний клавиш.

Подробнее о надежных паролях…

Совет. Используйте браузер, который может сохранять пароли, например Chrome.

Настройте двухэтапную аутентификацию

Защитите свой аккаунт от злоумышленников. Для двухэтапной аутентификации нужен пароль, который вы знаете, и код, который высылается на ваш телефон.

  1. Следуйте инструкциям по настройке двухэтапной аутентификации.
  2. Сохраните резервные коды в надежном месте на случай, если не сможете воспользоваться телефоном.

Не разрешайте доступ ненадежным приложениям

Некоторым приложениям не стоит доверять. Чтобы защитить свои данные:

  • не открывайте приложениям доступ к аккаунту, если не уверены в их надежности;
  • запретите доступ непроверенных приложений к аккаунту.

Следите, чтобы ваши действия и данные аккаунта не сохранялись на общедоступных компьютерах. Для этого следуйте инструкциям ниже.

  1. На общедоступном компьютере откройте в Chrome окно в режиме инкогнито.
  2. В этом окне войдите в свой аккаунт.
  3. Закончив работу, выйдите из аккаунта и закройте все окна в режиме инкогнито.

Примечание. Отслеживание действий в вашем аккаунте Google работает даже в режиме инкогнито. Ваши действия сохраняются как обычно в соответствии с выбранными настройками.

Настройте блокировку экрана

Злоумышленники могут использовать ваш телефон для доступа к личным данным или аккаунту. Блокировка экрана защитит вашу личную информацию, даже если вы потеряете телефон или его украдут.

Подробнее о том, как настроить блокировку экрана…

Добавить комментарий

Ваш адрес email не будет опубликован. Обязательные поля помечены *

Adblock
detector