Google’s Powerful Features

Google’s Powerful Features

Google’s Powerful Features Data leaks in Indonesia are rife as a subject of discussion for many people in Indonesia. Confidential personal data is even trade. Therefore, it is better for us as a society to be aware of our behavior when surfing the internet. Launching from the page, users are aske to implement several things periodically. First, the public is aske to carry out a security check. You do this by adding or updating your recovery phone number and email address.

Google’s Powerful Features

“Your recovery phone number and email address is a very strong security solution.

This contact info can be use to help block someone from using your account without permission, notify you of suspicious activity on the account, and help recover your account if it is locke. Then enable two-step verification. Two-step verification helps prevent hackers from accessing your account, even if they steal your password.

“To avoid common phishing techniques associated with SMS codes, choose a stronger second verification step, i.e. security key (the most secure verification step), Google command (more secure than SMS codes),” Google wrote. The next step to avoid hackers, could be to remove risky access to your data. Google recommends removing account access for non-essential apps to better protect sensitive information.

Google asks its users to manage applications that have access to personal accounts and learn more about the risks. Also users are aske to disable access for applications that use less secure login technology. In addition, Google also warns that if the browser, operating system or application is old, the software may not be safe from hackers. Therefore, updating or updating software helps protect user accounts.

The security and privacy settings can be checke via the site. From there, Google account users can see the settings provided by Google. After entering the page, surfers immediately enter the Home Page. In that section, users can see various important things, ranging from things users nee to know to warnings that their account has been hacke.

Here, Google account users can customize their own security and privacy.

There are two main features that can help Google account users maintain the security of their accounts, namely:

1. Password Manager (

If a Google account user saves passwords to a Google account, all passwords to a particular site or service will appear in this section.

2. Password Checkup (

This feature ensures that the password used is secure and provides suggestions for strengthening the password. Some of the features offered by Password Check Up include:
Warning if user password is hacke.
Warning when Google account users use the same password on several different sites or services.
when password is too weak.

Keep in mind, users are advise to use a different password for each account, be it a bank, e-mail, or game account.

If the same password is for a bank account, e-mail and game account, then one of them is hacke, then it is very likely that other accounts using the same password will also be hacke. “It’s very risky to use the same password on multiple sites. If your password on one site is compromise, it can be use to access your account on multiple sites,” explains Google.

Google also recommends that users remove unnecessary apps and browser extensions. As more and more apps are installe on the device, the device becomes more vulnerable. Install only essential apps and browser extensions on devices that have access to sensitive information. Avoid installing unknown apps or apps from unknown sources to protect your device and personal info.

Finally, hackers can use email, SMS, phone calls and pages to pretend to be institutions, outgoing members or co-workers. Don’t give out your password. Google will never ask for your password in an email, message or phone call. Do not respond to suspicious emails, SMS, instant messages, pages or phone calls asking for your personal or financial information. Do not click links in emails, messages, pages or pop-ups from sites or senders you cannot trust.

Data Recovery