It is often said that there is little concern for protecting sensitive data or access to accounts. and the Google wants to make sure that no one else can access an unused Gmail account, thus enhancing the authentication system with a new layer of protection.
The system will be rolled out to all users over the next few weeks. This additional user validation step will be triggered when you try to do some action, such as adding a forwarded address or when modifying Gmail filtersTo ensure that these actions are not performed by malicious third parties. For example, to prevent filters from being created by a hacker to forward emails to new addresses without the user noticing.
In the Blog From Google, the specific situations in which the new validation layer works are explained. a Create filters, but also import or edit filters. When you discover that a new forwarding address has been added in the “Forwarding and POP/IMAP” settings.. So are IMAP authorization options from Settings.
See examples of security measures in the gallery:
As you can see in the pictures, when you perform these actions, the Google will evaluate the actions of the access attempts and if it deems there is a risk, the account verification system will appear immediately. The user will be asked if it recognizes the device on which attempts to change settings are being made.
This is where a second verification element, such as a two-factor verification code, comes in. If this authentication fails, because the user does not perform it, you will receive a “Critical Security Alert” notification on your secure devices. If it is not detected, it will only alert the user that another device is trying to make the change, which must confirm that it is the user and device in question.
there Note that, subject to technology, this additional protection for Gmail will be available to all Google Workspace customers and people with Google accounts and company-provided identities.
How To TeK is a section of SAPO TeK that aims to help all users with simple (but seemingly complex) tasks when using computers and mobile phones. If you have suggestions for tricks you’d like illustrated, send an email to [email protected].
“Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator.”