Gmail Security Checklist Aasim Naseem, October 19, 2010 | Read Count: 15,477 Category: My Tutorials > Random TipsWhether you just regained access to Gmail, or you want to make sure your account is secure, take a minute to complete Gmail security checklist to make sure your mail security measures are up to date. Step 1 – Your Computer Check for viruses and malware While no virus scanner can catch 100% of infections, it is still important to run a scan on your computer with a trusted anti-virus software (or install a program that runs in the background and scans continuously). If the scan detects any suspicious programs or applications, remove them immediately. Find virus scanners Make sure your operating system is up to date Operating systems release patches to repair security vulnerabilities. Whether you use Windows or Mac OS, we recommend protecting your computer by enabling your automatic update setting, and updating when you get a notification. Make sure to perform regular software updates Some software updates aren’t included in your operating system updates, but they are just as important. Software such as Adobe Flash, Adobe Reader, and Java release regular updates that may include repairs for security vulnerabilities. Step 2 – Your Browser Make sure your browser is up to date To check for browser updates in Internet Explorer, select the Tools tab and click Windows Update. In Firefox, just click the Help tab and select Check for Updates. Google Chromeautomatically updates when a new version is released Check your browser for plug-ins, extensions, and third-party programs/tools that require access to your Google Account credentials Plug-ins and extensions are downloadable computer programs that work with your browser to perform specific tasks. For example, you may have downloaded a plug-in or extension that checks your Gmail inbox for new messages. Google can’t guarantee the security of these third party services. If those services are compromised, so is your Gmail password. Step 3 – Your Google Account Change your password If your account has been recently compromised, you should update your password now. In general we suggest you change it twice a year, following these guidelines: Pick a unique password that you haven’t previously used on other sites or on Gmail. Just changing one character or number still counts as reusing your password. Don’t use a dictionary word or a common word that’s easily guessable. Use a combination of numbers, characters, and case-sensitive letters. Check the list of websites that are authorized to access your Google Account data Make sure that the list of authorized websites are accurate and ones that you have chosen. If your Google Account has been compromised recently, it’s possible that the bad guys could have authorized their own websites to access your account data. This may allow them to access your Google Account after you have changed your password. To edit the list of authorized websites: Sign in on the Google Accounts homepage. Click the My Account link displayed at the top right of the page. Click Change authorized websites. This page will list all third-party sites you’ve granted access to. Click the Revoke Access link to disable access for a site. Update your account recovery options We all may forget our passwords at some point, so we strongly encourage that you update your account recovery options. To update these options, sign in to your Google Account by going to https://www.google.com/accounts and click Change password recovery options. Recovery email address: We can use your recovery email address to communicate with you if you lose access to your account. Learn more. SMS: We can send you a recovery code to your mobile phone number, which you can use to reset your password. Learn more. Secret question: This option is only available if you can’t use the above recovery options and only if haven’t tried to sign in during the past 24 hours. An ideal answer to your security question is easy for you to remember, but hard for others to guess. Step 4- Your Gmail Settings Use a secure connection to sign in. In your Gmail settings, select ‘Always use HTTPS.’ This setting protects your information from being stolen when you’re signing in to Gmail on a public wireless network, like at a cafe or hotel. Read more. Check for any strange recent activity on your account. Click the Details link next to the ‘Last Account Activity’ entry at the bottom of your account to see the time, date, IP address and the associated location of recent access to your account. Confirm the accuracy of your mail settings to ensure that your mail stays and goes where you want it to. Sign in to your account and click on the Settings link at the top to check the following tabs: General: Check Signature, Vacation Responder, and/or canned responses for spammy content Accounts: Verify your Send Mail As, Get mail from other accounts, and Grant access to your account are all accurate. Filters: Check that no filters are sending your mail to Trash, Spam, or forwarding to an unknown account. Forwarding and POP/IMAP: Ensure your mail isn’t sent to an unknown account or mail client. Step 5- Final Reminders Watch out for messages that ask for your username and/or password. Gmail will never ask for this information. Never give out your password after following a link sent to you in a message, even if it looks like Gmail’s sign-in page. Access Gmail directly by typing https://mail.google.com in your browser’s address bar. Don’t share your password with other websites – Google can’t guarantee the security of other websites and your Gmail password could be compromised. Keep secrets! Never tell anyone your password, or your secret question and answer; if you do tell someone, change it as soon as possible. Clear forms, passwords, cache and cookies in your browser on a regular basis – especially on a public computer. Only select ‘Stay signed in’ if you’re signing in from a personal computer. Always sign out when you’ve finished reading your mail. (source : Gmail help center) Author Profile Aasim Naseem Hey, Thanks for your interest. I’m a PMP, AWS Solutions Architect, and Scrum Master certified professional with 17+ years of hands-on experience leading projects, building teams, and helping organizations deliver software solutions better, faster, and smarter. Outside of work, I’ve got a deep curiosity for history — especially ancient civilizations like Egypt. I also enjoy reflecting on the everyday moments that shape how we live and work. This blog is my space to share insights, lessons, and thoughts from both my professional journey and personal interests. Thanks for reading — and I hope you will find something here that matches your interest. Latest entries IslamJune 6, 2025 | Read Count: 282Economic impact of Eid-ul-Adha PMP CertificationMay 23, 2025 | Read Count: 493Best PMP Study Resources for 2025 (Books, Courses, Tools & More) Agile & FrameworksMay 7, 2025 | Read Count: 463Agile vs Scrum: Finally Understanding the Difference Agile & FrameworksApril 25, 2025 | Read Count: 493When Not To Use Agile: 5 Signs You Need a Different Approach Random Tips 6 steps for gmail securityBrowser security for gmailGmail Checks for viruses and malwareGmail Security Checklistgmail settings for security
Random Tips What’s New in Internet Explorer 8 October 12, 2010 | Read Count: 15,442April 7, 2025 Category: My Tutorials > Random TipsHello All. hope doing well. This post introduces the platform features of Windows Internet Explorer 8. Click here to download Internet Explorer 8 for Windows XP, Windows Vista with Service Pack 1 (SP1), Windows Server 2003, or Windows Server 2008. The currently released version of Windows 7 includes Internet Explorer 8. Note… Read More
Random Tips 20 Things I Learned About Browsers and the Web November 28, 2010 | Read Count: 15,471 20 Things I Learned About Browsers and the Web Read More
Random Tips EXOdesk, Your Virtual Desk; November 21, 2011 | Read Count: 14,482April 7, 2025 Category: My Tutorials > Random TipsSomething that will change everything on your desk; I’m just loving the concept; EXOpc has posted a video of its EXOdesk — an interactive desk environment that lets you do all sorts of tasks on a virtual space on your desk — in action and… Read More
The best-kept secret in the fight against viruses and spyware is a company called HonorPC It works even if you have a problem that won’t allow Windows to start. I have done online banking on my HonorPC for almost three years and have never installed antivirus. I bought my HonorPC for $1,000, which included a 22-inch LG monitor and laser mouse. I recently got a Windows 7 upgrade from HonorPC and I’m very happy with it. Their web site is http://honorpc.com and they have their phone number right on the home page. You should check them out before they are bought out by a big computer company and banished from the face of the earth! Reply
The best-kept secret in the fight against viruses and spyware is a company called HonorPC! They feature one-key recovery that leaves your documents, music, pictures, videos, and favorites intact! It works even if you have a problem that won’t allow Windows to start. I have done online banking on my HonorPC for almost three years and have never installed antivirus. I bought my HonorPC for $1,000, which included a 22-inch LG monitor and laser mouse. I recently got a Windows 7 upgrade from HonorPC and I’m very happy with it. Their web site is http://honorpc.com and they have their phone number right on the home page. You should check them out before they are bought out by a big computer company and banished from the face of the earth! Reply