How to find out which devices have access to your network accounts

The urgency of the problem is not due to hacker crafts in order to crack the account and devastate your purses. We all live in a society whose representatives periodically find it very interesting to stick their nose out of their business. A roommate, colleague or companion can use your device and just read the correspondence in social networks, a mailbox or one eye to look at the contents of the cloud disk. Thinking complex passwords and including two-factor authentication here can not save. Therefore, it is worthwhile to check whether someone “periodically” sucks in without your knowledge to the confidential information.

Google

The recently updated Google Account settings included the “Devices and Actions” section. The page displays all the devices connected to the profile within the last four weeks.

Check if the mobile device you are logged into belongs to. Remember, did you log in to the account at night or during long trips? Please note, has your browser been logged in with the usual browser? Analyze, from those IP-addresses, that is geographical places, access is made?

Disabling access to a Google Account for a mobile device

If you notice anything suspicious, disable access to the gadget profile on Android or iOS, or update the security settings if abnormal activity was conducted through the computer.

Facebook

The billion-dollar community of the most popular social network likes to correspond, share photos and videos, but rarely cares about the security of personal information. In vain, because Facebook pays great attention to confidentiality, under which an impressive menu of security settings. Among them there is an option “Where are you from?”. The proposed list includes both desktop browsers and mobile applications, including Messenger.

“In contact with”

Runet is filled with requests for breaking VK-accounts, because this social network is the most common in our region. Therefore, it is not superfluous to at least occasionally drop into the “History of Activity” section, which is located on the “Security” tab of the service settings. By default, only the last activity will indicate to you, but under it there is a link to the full table of running sessions.

“Classmates”

Often, Runet users duplicate all milestones with their eventful life and for their fellow students. “Classmates”, along with other devourers of time, are trying to tighten the level of safety of their admirers. Why only “try”? Look at their “List of connections for the last 30 days” and you will understand. Enough is sparse, because the IP and the time of entry would be nice to complement and type of device. We hope for an improvement in the near future.

Microsoft

The link “Recent actions” of the security settings for the Microsoft account looks less attractive than that of Google, but is more saturated in content. Why? You are invited to evaluate a more detailed list of actions. For example, you will learn that someone was trying to find a password for the profile.

Checking the security of your Microsoft account

A detailed description of the actions is provided in the corresponding help of the service.

The button “It was not me” lets Microsoft know that an attacker could access the account. Therefore, you will be asked to strengthen security measures by changing the password and updating the security data.

Dropbox

A popular solution for remote storage and synchronization of data between devices also has a tool on its board to track access to the cloud disk. Go to the Dropbox settings and switch to the security tab. Here you will be shown the performed sessions and input devices. In addition, you will find out which applications have been connected to the profile. In a couple of mouse clicks, you can disable access to the account to third-party utilities and mobile devices.

The list does not include the web services and social networks that you use? Let us know about them in the comments.

Loading...