DATA DOCTORS

Here’s how to know if your Google account has been hacked

Oct 7, 2023, 5:45 AM

laptop with Google on the display screen...

(Pexels File Photo)

(Pexels File Photo)

Q: I think I’ve been hacked – is there a way to see if someone is using my Google account?

A: It’s an unsettling feeling when you suspect that you’ve been compromised and Google accounts are highly targeted by the Internet underworld because they know that virtually everyone has one.

One of the most common methods of compromising a Google account is through phishing scams that appear to be security alerts from Google.

If you’ve responded to one recently, especially if they convinced you to sign into your account, you should be concerned.

It’s also possible that you signed into your account on a spouse’s or a friend’s device and forgot to sign out, which would provide the owner of the device access to your account.

First Step – Device Activity
You can access a list of devices that have signed into your account in the last 28 days by going online (make sure you’re signed into the account in question first).

Each device will be displayed along with the number of sessions either currently running or that have been active in the past.

If you see any device that you don’t recognize, you have good reason to be concerned and should change your password. The good news is that you haven’t been locked out just yet if you can access this screen.

Click on any of the sessions to see the estimated location and time of the most recent activity along with the browser, app, or services that have access to your account on that device with an option to “Sign out.”

Security Checkup
Something every Google user should do on a regular basis is run a security checkup by visiting online.

The color of the shield at the top of the page will tell you if you have recommended actions that you should take. Green means that everything looks good while yellow or red means that you have items you should review.

Each entry will have icons so you can quickly go to the area of concern from the security checkup. The first entry (Third-party access) should be checked regardless of the icon color as apps or programs that you don’t use may still have access to your account.

Password Checkup
Your passwords are the keys to your kingdom and knowing when they have been compromised is important.

Run the Password Checkup from the security page to see if any of your saved passwords have been compromised. If you can’t remember what the password was for a specific app or service, click on the three dots to the right and select “View Password.”

Data Doctors

Man checks Wi-Fi connection...

Ken Colburn, Data Doctors

Computer tips: How Wi-Fi 7 can be beneficial and why you should consider the upgrade

Now, here’s the big question: Do you really need to upgrade to Wi-Fi 7? The answer depends largely on how you use the internet and what kind of performance you expect from your wireless network.

6 days ago

Which backup option is better: cloud storage or cloud backup?...

Data Doctors

How to compare and contrast cloud storage and cloud backup

So you're considering both cloud storage and cloud backup. Not sure which backup option is better for you? This guide can help.

13 days ago

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you s...

Ken Colburn, Data Doctors

Here are some benefits of having dual displays

If you’re on your computer all day long, you’ll wonder how you ever lived without it once you start having dual displays.

19 days ago

A person holding up their smartphone....

Ken Colburn, Data Doctors

Here are the tips on how to enable crash detection on mobile devices

Various mobile devices have different ways to enable crash detection and here are the tips to enable them on certain devices.

27 days ago

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in en...

Ken Colburn, Data Doctors

Here are the pros and cons of using Windows BitLocker

Various versions of Windows include the option to use BitLocker, which is Microsoft’s built-in encryption tool. Here are pros and cons.

1 month ago

College students will be fully responsible for managing their devices independently and preparing t...

Ken Colburn, Data Doctors

Here are cybersecurity tips for college students

College students will be fully responsible for managing their devices independently and preparing them for the most common dangers is important.

1 month ago

Sponsored Articles

...

Day & Night Air Conditioning, Heating and Plumbing

It wouldn’t hurt to get your AC checked after Arizona’s excruciating heat wave

A well-maintained air conditioning unit is vital to living a comfortable life inside, away from triple-digit heat in Arizona.

...

Midwestern University

Midwestern University Clinic visits boost student training & community health

Going to a Midwestern University Clinic can help make you feel good in more ways than one.

...

Condor Airlines

Condor Airlines can get you smoothly from Phoenix to Frankfurt on new A330-900neo airplane

Adventure Awaits! And there's no better way to experience the vacation of your dreams than traveling with Condor Airlines.

Here’s how to know if your Google account has been hacked