{"id":6095,"date":"2019-09-25T15:12:02","date_gmt":"2019-09-25T08:12:02","guid":{"rendered":"http:\/\/gcloudvn.wam.vn\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/"},"modified":"2023-05-04T16:54:48","modified_gmt":"2023-05-04T09:54:48","slug":"cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack","status":"publish","type":"post","link":"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/","title":{"rendered":"How to protect your Gmail account and personal information from being hacked"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Gmail is an email service that is increasingly used in offices and schools with more than a billion monthly active users. Not only is it used to send and receive mail, Gmail also plays a very big role: As a store of personal data and a &quot;bridge&quot; to many other applications (for example, when you use Gmail to create accounts). accounts on Facebook, LinkedIn). That&#039;s why, the <\/span><b>protect Gmail account<\/b><span style=\"font-weight: 400;\"> It&#039;s not just about protecting an email address, it&#039;s also about <\/span><b>Protect yourself online<\/b><span style=\"font-weight: 400;\">. This article will guide you through the necessary steps to help you not fall into the situation of &quot;losing cows to build a barn&quot;.<\/span><\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewbox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewbox=\"0 0 24 24\" version=\"1.2\" baseprofile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#1_Kiem_tra_tong_quat_tinh_trang_bao_mat_cua_tai_khoan_Gmail\" >1\/ Check the general security status of your Gmail account<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#11_Bo_sung_hoac_cap_nhat_cac_lua_chon_khoi_phuc_tai_khoan\" >1.1. Add or update account recovery options<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#12_Bat_tinh_nang_hai_buoc_xac_thuc_2-Step_Verification\" >1.2. Enable two-step verification (2-Step Verification)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#13_Loc_va_xoa_cac_ung_dung_tiem_an_nguy_co_rui_ro_doi_voi_du_lieu_cua_ban\" >1.3. Filter and remove apps that pose a risk to your data.<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#14_Bat_tinh_nang_khoa_man_hinh\" >1.4. Turn on screen lock<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#2_Hay_cap_nhat_cac_phan_mem_ma_ban_dang_su_dung\" >2\/ Please update the software you are using<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#3_Su_dung_mat_khau_%E2%80%9Cmanh%E2%80%9D_va_%E2%80%9Cdac_biet%E2%80%9D\" >3\/ Use \u201cstrong\u201d and \u201cspecial\u201d passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/gcloudvn.com\/en\/kienthuc\/cach-bao-ve-tai-khoan-gmail-va-thong-tin-ca-nhan-khoi-bi-hack\/#4_Bao_ve_ban_than_khoi_nhung_tin_nhan_va_noi_dung_dang_nghi\" >4\/ Protect yourself from suspicious messages and content<\/a><\/li><\/ul><\/nav><\/div>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"1_Kiem_tra_tong_quat_tinh_trang_bao_mat_cua_tai_khoan_Gmail\"><\/span><span style=\"font-size: 14pt;\"><b>1\/ Check the general security status of your Gmail account<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"11_Bo_sung_hoac_cap_nhat_cac_lua_chon_khoi_phuc_tai_khoan\"><\/span><b><i>1.1. Add or update account recovery options<\/i><\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">These options may include a phone number or another email address. Although the operation is very simple, just providing this information to Google will save you a lot of trouble later. However, due to not paying attention or thinking it is not necessary, many users often lose their accounts before they know the importance of recovery information. Specifically, these communications will be used to:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Prevent others from using your account without permission<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Send alerts if your Gmail account has suspicious activity. For example, logging in from an unknown device or address, or just granting permission to a third party to access information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Recover your account in case you get hacked, or naturally can&#039;t log in as usual.<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Please refer to how to add or change account recovery information <\/span><a href=\"https:\/\/support.google.com\/accounts\/answer\/183723\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"12_Bat_tinh_nang_hai_buoc_xac_thuc_2-Step_Verification\"><\/span><b><i>1.2. Enable two-step verification (2-Step Verification)<\/i><\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">As the name suggests, two-step verification will require you to double-prove that: You are the one with access to your account. Specifically, after entering your email address and password, you will have to perform one more authentication operation. It could be one of the following:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/accounts\/answer\/7026266\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Use Google Prompt on your phone<\/span><\/a><span style=\"font-weight: 400;\">: After completing the first authentication step, the system will send a notification to your phone to verify again with the message \u201cTrying to sign in?\u201d along with the details of the login (device, time, location). If so, just tap the \u201cYes\u201d option on your phone. This way is not only faster, but also considered safer <\/span><i><span style=\"font-weight: 400;\">enter the code sent to your phone*.\u00a0\u00a0<\/span><\/i><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><i><span style=\"font-weight: 400;\">*Previously you can use another way is to enter the code sent via text message. However, this way was soon caught by hackers and they also found a way to cheat to steal information. Therefore, it is best to use only one of the two methods outlined here.<\/span><\/i><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14824\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2019\/09\/google-prompt.jpg\" alt=\"How to protect your Gmail account and personal information from being hacked 1\" width=\"651\" height=\"528\" \/><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/support.google.com\/accounts\/answer\/6103523\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">Using a security key \u2013 Security Key<\/span><\/a><span style=\"font-weight: 400;\">: After all efforts to &quot;digitize&quot; everything, perhaps returning to the traditional, physical &quot;key&quot; method is still\u2026 the safest. This key is designed like a USB that you can easily carry and easily plug into your computer every time you need to authenticate.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-14827\" src=\"https:\/\/gcloudvn.com\/wp-content\/uploads\/2019\/09\/phil-titan-key-4.jpg\" alt=\"How to protect your Gmail account and personal information from being hacked 2\" width=\"649\" height=\"487\" \/><\/p>\n<h3 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"13_Loc_va_xoa_cac_ung_dung_tiem_an_nguy_co_rui_ro_doi_voi_du_lieu_cua_ban\"><\/span><b><i>1.3. Filter and remove apps that pose a risk to your data.<\/i><\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">An email account is often used to connect to many other applications \u2013 not only social networking sites, but also used to subscribe to other services, software, and add-ons. During this registration process, the user may not pay attention to the service provider&#039;s request to access information.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For example, quite a few parties are now asking you to allow them to read emails; edit, upload some content to Google account. There will even be applications that require almost full access and they can view and change most information related to the account.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">So it&#039;s important that you know and manage who has access to your account. If those are not necessary, important applications, they should be deleted.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">You can click on the <\/span><a href=\"https:\/\/myaccount.google.com\/permissions\" target=\"_blank\" rel=\"nofollow noopener\"><span style=\"font-weight: 400;\">My Account by Google<\/span><\/a><span style=\"font-weight: 400;\"> to see a list of which sites and apps have access to which parts of their data. For example the image below:<\/span><\/p>\n<h3 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"14_Bat_tinh_nang_khoa_man_hinh\"><\/span><b><i>1.4. Turn on screen lock<\/i><\/b><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Whether it&#039;s a computer screen or a phone screen, you should be careful and set a password. Screen lock helps protect your device from unauthorized access. Especially, if you use 2-step authentication, and the second authentication step is done on the phone, the screen lock becomes even more important.<\/span><\/p>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"2_Hay_cap_nhat_cac_phan_mem_ma_ban_dang_su_dung\"><\/span><span style=\"font-size: 14pt;\"><b>2\/ Please update the software you are using<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Since the release of the software, the production unit will regularly update and fix bugs (if any) to ensure the best user experience. These updates include protecting users from potential vulnerabilities that pose a threat to cyberattacks.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Therefore, if the software you are using such as browsers, applications, operating systems, etc. has not been updated to the latest version, the risk of being attacked by hackers is completely possible.\u00a0<\/span><\/p>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"3_Su_dung_mat_khau_%E2%80%9Cmanh%E2%80%9D_va_%E2%80%9Cdac_biet%E2%80%9D\"><\/span><span style=\"font-size: 14pt;\"><b>3\/ Use \u201cstrong\u201d and \u201cspecial\u201d passwords<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">A very common habit of users is to use the same password for many accounts, for many different sites. Some users use many passwords, then write them all down in the Note section of the phone. This habit will have unpredictable consequences if a certain page is hacked or when the phone falls into the wrong hands.\u00a0<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Therefore, you need to create a strong and special password for each of your accounts.<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">You might consider using a password manager app (<\/span><span style=\"font-weight: 400;\">Password manager<\/span><span style=\"font-weight: 400;\">) to generate unique passwords. (One tip to make using Gmail more convenient and secure is to use the Chrome browser developed by Google itself.)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Protect your password from hackers: Use it <\/span><span style=\"font-weight: 400;\">Password Alert<\/span><span style=\"font-weight: 400;\"> for Chrome to be sent a timely notification each time you enter your Google account password on a non-Google Web site (such as pages that masquerade as Google&#039;s).<\/span><\/li>\n<\/ul>\n<h2 style=\"padding-left: 40px; text-align: justify;\"><span class=\"ez-toc-section\" id=\"4_Bao_ve_ban_than_khoi_nhung_tin_nhan_va_noi_dung_dang_nghi\"><\/span><span style=\"font-size: 14pt;\"><b>4\/ Protect yourself from suspicious messages and content<\/b><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Hackers can use emails, phone messages, calls or websites and pretend to be relatives, friends, colleagues, or reputable organizations. So be wary of:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Suspicious requests:<\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don&#039;t tell anyone to give your password to anyone. Remember that Google will never ask for your password via email, text, or phone (so do other service providers, e.g. no bank calls asking for your password or code\/eToken). your).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do not respond to texts, emails, websites, etc. that ask you for personal or financial information.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Do not click on links in emails, messages, or pop-ups from untrustworthy websites or senders.<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Potentially dangerous emails for information fraud (email phishing)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Dangerous Websites: Part of the reason you should trust and use Google apps, including Chrome and Search, is because they&#039;re designed and developed to warn you about dangerous content and unwanted software (which is deliberately tricking users into installing them). You can learn more about warnings in <\/span><span style=\"font-weight: 400;\">Chrome<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Search<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The operations outlined above are all important instructions that you should complete because they can support each other and protect your account in the best way. In addition, no matter what software you install or do, the most important thing is still carefulness and vigilance from the user. Wish you safe online activities\u00a0<\/span><\/p>\n<p style=\"text-align: right;\"><strong>Update: <a href=\"https:\/\/gcloudvn.com\/en\/\">Gimasys<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Gmail is an email service that is increasingly used in offices and schools with more than a billion monthly active users. Not only used to send and\u2026<\/p>","protected":false},"author":1,"featured_media":6096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6095","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kienthuc","entry","has-media"],"_links":{"self":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/comments?post=6095"}],"version-history":[{"count":0,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/posts\/6095\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media\/6096"}],"wp:attachment":[{"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/media?parent=6095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/categories?post=6095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gcloudvn.com\/en\/wp-json\/wp\/v2\/tags?post=6095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}