Play It Safe and Update Your Google Password Today

Play It Safe and Update Your Google Password Today

When was the last time you intentionally and systematically changed your passwords?

It’s a good practice, even though it can be a huge pain. For many of us, Google is a huge central hub that is tied to a lot of our data. With all of the cybersecurity issues and data breaches, it’s just a good idea to keep your Google account in check.

What Does My Google Account Cover?

More than likely, it covers a whole lot. Google is a whole lot more than the search engine. If you have a Gmail account, an Android smartphone, or use the Chrome browser, you most definitely have a Google account. This means if your Google account gets compromised, cybercriminals can get access to your phone, your email, and a whole lot more.

  • (for custom tailored search results)
  • Gmail
  • Google Drive
  • Google Docs/Sheets
  • Google Maps
  • Android
  • Google Workspace
  • Google Chrome
  • YouTube

And so much more. Essentially, if it has the word “Google,” “Android,” or “Chrome,” it’s probably tied to your Google account.

How to Update Your Google Password

Thankfully, Google makes it really easy to update your account password. 

  1. Visit If you aren’t signed in already, log in with your email/phone number and password.
  2. Click Security on the left-hand side.
  3. Look for Signing in to Google. Click Password.
  4. Google will usually prompt you to provide your current password, and then have you input a new password.

IMPORTANT! Your password needs to be 100% unique. Don’t use the same password that you use for any other account. That’s just asking to get hacked. Instead, make sure your password is unique, strong, and secure. It should not contain any personally identifiable information, like a birthdate, maiden name, social security number, phone number, or anything else like that.

When in doubt, use a password manager to generate a secure, random password with lowercase letters, capital letters, numbers, and symbols. Alternatively, stringing four or five completely random words together with various capital letters, numbers, and symbols between can be a helpful way to create complex, easy-to-remember passwords.

You’ll likely need to log back in to your Google account on some devices, but usually Google can keep you logged into your smartphones/tablets without needing to tap your new, long, complicated password in.

Hold On, You Aren’t Done Yet!

Before we call it a day, let’s take another minute or two to set up 2-Step Verification if you haven’t already. It’s really important for locking down your accounts, and can do a lot to protect you if your password does get stolen or your data is breached. 

After changing your password, on the Google Account page:

  1. Click the Security option on the left-hand side of the page.
  2. Click 2-Step Verification.
  3. Google may prompt you to enter in your password again, just to make sure it’s you.
  4. Depending on what Google already knows about you, this might go a few different ways—you’ll either be prompted to set up a phone number to get a text message or phone call, or Google might walk you through setting this up on your smartphone. Either way, follow the on-screen instructions. 

Google’s 2-Step Verification gives you a handful of options. The most convenient is the Google prompt which gives you a notification on your Android smartphone that needs to get tapped in order to allow you to log into your Google account on a new device. Getting sent an SMS can be convenient, but it’s a little less secure as technically hackers could intercept your text messages if they really wanted to. The most secure option is setting up the Authenticator app. Click Set Up when prompted and follow the steps Google provides.

If you have a Google Workspace account for your business, you may need to contact an administrator to update or enable your Google 2-Step Verification. If you need any help, don’t hesitate to reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Productivity Business Computing User Tips Privacy Cloud Email Microsoft Network Security Hackers Software Efficiency Business Workplace Tips Hosted Solutions Data Hardware Computer Google Malware IT Services Communication IT Support Mobile Devices Small Business Android Mobile Device Smartphone Internet Cloud Computing Tech Term Phishing Ransomware Backup Data Recovery Managed IT Services Users Innovation Smartphones Saving Money Windows VoIP Outsourced IT Upgrade Miscellaneous Cybersecurity Network Information Data Backup communications Social Media Disaster Recovery Microsoft Office Quick Tips Browser Passwords Windows 10 Facebook Office 365 Business Continuity Business Management Server Managed IT Services Managed Service Productivity Internet of Things COVID-19 Data Management Apps Windows 10 Vulnerability Remote Monitoring Remote Work Analytics App Artificial Intelligence Gmail Collaboration Save Money Word Gadgets Router Conferencing Government Mobile Office Remote Workers Infrastructure Encryption Money WiFi Chrome Managed Service Provider Google Drive Applications Virtual Reality Employer-Employee Relationship Networking Website Company Culture Access Control Paperless Office VPN Holiday BYOD IT Support Display Spam Settings Information Technology Tip of the week Avoiding Downtime Document Management Content Filtering Antivirus Bandwidth Automation Wireless End of Support YouTube Apple Education Risk Management Storage Employee-Employer Relationship IT Management Data Security Office Tips Wi-Fi Computers Business Technology Hacker Data storage Virtual Private Network Unified Threat Management Development Big Data Operating System Firewall Maintenance HIPAA BDR Robot Best Practice Mobile Security Managed IT Service Social Network Administration Customer Relationship Management Scam Mouse Solid State Drive iOS Going Green Compliance Business Intelligence Break Fix Identity Theft Remote Computing Search Training Hard Disk Drive Printing Regulations SaaS Managed Services Password MSP Server Management Augmented Reality Virtualization Managing Stress Touchscreen OneNote Laptop Retail Alert Data Breach The Internet of Things Managed IT Data loss Windows 7 Telephone Systems Tablet How To Computing desktop Outlook Software as a Service Cybercrime Bring Your Own Device Downtime LiFi Vendor Management Marketing Social Monitors IT Hosted Solution Two-factor Authentication Humor Chromebook Vendor Current Events Solar Social Engineering Monitoring User Error Solid State Drives Uninterrupted Power Supply Policy Assessment Patch Management Shortcuts Mobile Management Spyware Twitter Employee-Employer Relationships File Sharing Smart Tech Websites Streaming Specifications Processor Computer Care IBM Employees Work Holidays Voice over Internet Protocol Heating/Cooling Troubleshooting Multi-Factor Security Business Analysis Halloween Banking Cryptocurrency Cooperation Service Level Agreement Hybrid Cloud Distribution IT solutions Safety Time Management Spying Printer National Security Procedure Google Docs Hotspot Internet Exlporer Security Cameras Profiles Analysis Students Connectivity Human Error Black Friday Memory Corporate Profile Gig Economy Hacks IT Technicians Optimization Automobile Payment Card Google Wallet Modem FinTech Servers Google Calendar Virus G Suite Scary Stories Reviews Bitcoin Staff Leominster Network Congestion Emergency Scalability Logistics Network Management Updates Dell Running Cable PCI DSS Business Growth Language Value Dark Web Utility Computing Mirgation Recycling Writing Mixed Reality Cabling Legal IoT Device Cyber Monday Reducing Cost WannaCry Buisness FBI Consulting Google Maps Inventory Unified Communications Virtual Desktop Drones Cookies LED Legislation Threats Sports Remote Windows 8 K-12 Schools Migration Asset Management Social Networking PowerPoint SharePoint Battery Computing Infrastructure Professional Services Dark Data Update Laptops Microsoft Excel Chatbots eWaste Techology Peripheral Deep Learning Star Wars Mobility Smart Technology Batteries K-12 Education Mobile Device Management Lenovo Shadow IT Nanotechnology Politics Statistics Co-Managed IT user treats Wearable Technology Network upgrade Digital Payment Memes Motherboard Cables Work/Life Balance Onboarding Downloads GDPR Files Alt Codes Alerts USB Customer Service Mail Merge Blockchain Managed Services Provider Identity Continuity Office Samsung VoIP Slack Unified Threat Management Hard Disk Drives Meetings Disaster Management Fraud Cost Management Health Private Cloud Shortcut Print Toner Distributed Denial of Service Myths Digital Instant Messaging Firefox Superfish Messaging Gamification Budget Screen Reader Charging Tech Support Bluetooth Content Comparison Huawei Shopping Smart Office Wires Digital Signage Data Warehouse RMM Typing Licensing Dongle Address Entertainment Permissions Notifications Webcam Electronic Medical Records Regulation Physical Security Error Upgrades Gadget Emoji Crowdsourcing Point of Sale Ben McDonald shares Travel Personal Information Botnet 3D Printing Printers Cortana Supercomputer CrashOverride Processors Motion Sickness Machine Learning Staffing Administrator Unsupported Software Taxes IT Budget Web Server what was your? Computer Repair Relocation GPS Mobile Data Financial IT Consultant How To Cameras Recovery Tracking Mobile Computing Cleaning Black Market Law Enforcement CCTV

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3