{"id":95478,"date":"2023-07-14T13:32:26","date_gmt":"2023-07-14T13:32:26","guid":{"rendered":"https:\/\/cloudnewshub.com\/?p=95478"},"modified":"2023-07-14T13:32:26","modified_gmt":"2023-07-14T13:32:26","slug":"how-to-check-if-someone-else-accessed-your-google-account","status":"publish","type":"post","link":"https:\/\/cloudnewshub.com\/?p=95478","title":{"rendered":"How to Check If Someone Else Accessed Your Google Account"},"content":{"rendered":"<div id>\n<p> Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account. <\/p>\n<\/div>\n<div id>\n<figure id=\"attachment_92897\" aria-describedby=\"caption-attachment-92897\" class=\"wp-caption aligncenter\"><img decoding=\"async\" class=\"wp-image-92897 size-article\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account.jpg\" width=\"770\"><figcaption id=\"caption-attachment-92897\" class=\"wp-caption-text\">Illustration: Andy Wolber\/TechRepublic<\/figcaption><\/figure>\n<p>Whenever a computer is out of your direct view and control, there\u2019s always a chance that someone other than you can gain access. A person who returns from a trip might wonder if their computer and accounts have been accessed during their absence. A person might notice odd activity in Gmail, not aware that their password has been made public (or \u201c<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">pwned<\/a>\u201c). Or, in some cases, a person might be surveilled by a partner, a family member, a colleague or even an unknown party.<\/p>\n<p><strong>SEE: <\/strong>Discover how to <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-recover-google-account\/\">regain access to your Google account<\/a><\/p>\n<p>To secure an account, you might first <a href=\"https:\/\/www.techrepublic.com\/article\/how-and-when-to-change-your-google-password\/\">change your password<\/a>, <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-set-up-two-step-verification-for-your-google-account\/\">enable two-factor authentication<\/a> or even enroll in Google\u2019s Advanced Protection Program. Those steps will help you secure your account.<\/p>\n<p>The following steps can help you figure out if someone other than you is accessing your Gmail or Google account.<\/p>\n<p>Jump to:<\/p>\n<h2 id=\"account\">Did someone access my Gmail account?<\/h2>\n<p>In a desktop web browser, Gmail allows you to review recent email access activity. Select Details in the lower-right area below displayed emails, below Last Account Activity (<strong>Figure A<\/strong>).<\/p>\n<p><strong>Figure A<\/strong><\/p>\n<figure id=\"attachment_4135207\" aria-describedby=\"caption-attachment-4135207\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4135207 size-article\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-1.jpg\" alt=\"Select Details in the lower-right area below displayed emails, below Last Account Activity.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135207\" class=\"wp-caption-text\">Select Details in the lower-right area below displayed emails, below Last Account Activity.<\/figcaption><\/figure>\n<p>If your Gmail account has been accessed in other locations or on other devices, you may display recent activity while signed in to Gmail from a desktop-class web browser.<\/p>\n<p>The system will show you information about the last 10 times your Gmail account has been accessed, along with the access type (browser, POP, mobile), location (IP address), and the date and time of access. This can help you identify if any of this access is from an unexpected device, place or time.<\/p>\n<p><strong>Note:<\/strong> If you use a virtual private network or a hosted desktop, the location data may reflect information related to your service provider, instead of your physical address.<\/p>\n<p>In a few cases, I\u2019ve had clients concerned about access in an expected location, but at an unexpected time. Sometimes, this was simply because they\u2019d left a computer on, with their browser or mail client open. The system could be configured to auto-check mail periodically. In one case, access occurred after a power outage. They\u2019d configure the system to automatically power on after an outage, so it signed in and downloaded new mail shortly after power was restored.<\/p>\n<h2 id=\"browser\">Did someone access my browser?<\/h2>\n<p>In the Chrome browser \u2014 and on any <a href=\"https:\/\/www.techrepublic.com\/article\/chromebooks-the-smart-persons-guide\/\">Chromebook<\/a> or Chrome OS device \u2014 press Ctrl + H to display browser history. Alternatively, type <em>chrome:\/\/history<\/em> in the omnibox, or select the three-vertical dot menu in the upper-right, then choose History | History. On macOS, press Command + Y. You may scroll through all available sites visited. Review these to see if any sites displayed are unexpected.<\/p>\n<p><strong>SEE:<\/strong> Lock down your Google account on iOS with <a href=\"https:\/\/www.techrepublic.com\/article\/how-to-use-google-smart-lock-on-ios\/\">Google Smart Lock<\/a><\/p>\n<p>Additionally, you may enter search terms in the box displayed above the historical URLs listed. For example, search for \u201csign in,\u201d or copy and paste this link into your browser omnibox: <em>chrome:\/\/history\/?q=sign%20in<\/em> to display most site login pages (<strong>Figure B<\/strong>). Again, review the results for any sites you don\u2019t expect. You might search for \u201cgmail.com\u201d as well.<\/p>\n<p><strong>Figure B<\/strong><\/p>\n<figure id=\"attachment_4135209\" aria-describedby=\"caption-attachment-4135209\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135209\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-2.jpg\" alt=\"v\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135209\" class=\"wp-caption-text\">Use Ctrl + H or Command + Y to display your browser history. You may also search history for terms, such as \u201clogin\u201d or \u201csign in,\u201d as shown.<\/figcaption><\/figure>\n<h2 id=\"did\">Did someone access my Google account?<\/h2>\n<p>Go to https:\/\/myactivity.google.com\/ to access your Google account history across all devices and Google services, such as YouTube, Google Maps and Google Play (<strong>Figure C<\/strong>). Depending on your security settings, you may need to reauthenticate when you attempt to access this information. Again, review any recorded data to make sure it corresponds with your usage.<\/p>\n<p><strong>Figure C<\/strong><\/p>\n<figure id=\"attachment_4135210\" aria-describedby=\"caption-attachment-4135210\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135210\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-3.jpg\" alt=\"Go to https:\/\/myactivity.google.com\/ to access your Google account history across all devices and Google services, such as YouTube, Google Maps and Google Play.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135210\" class=\"wp-caption-text\">The My Google Activity page displays any recorded access of web sites, apps, location and YouTube.<\/figcaption><\/figure>\n<p>Similarly, go to https:\/\/myaccount.google.com\/device-activity to review a list of devices to which you\u2019ve signed in with your Google account (<strong>Figure D<\/strong>). You may select the arrow to the right of any displayed device session, then choose Sign Out to prevent any future access without reauthentication on a device.<\/p>\n<p><strong>Figure D<\/strong><\/p>\n<figure id=\"attachment_4135212\" aria-describedby=\"caption-attachment-4135212\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135212\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-4.jpg\" alt=\"Review a list of devices to which you've signed in with your Google account.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135212\" class=\"wp-caption-text\">You may also review the devices where you\u2019re signed in to your Google account. Select the three-dot menu in the upper-right corner of the box for each device to sign out of any device.<\/figcaption><\/figure>\n<p>Go through Google\u2019s Security Checkup for a step-by-step review of every item Google\u2019s system identifies as a potential security issue (<strong>Figure E<\/strong>).<\/p>\n<p><strong>Figure E<\/strong><\/p>\n<figure id=\"attachment_4135206\" aria-describedby=\"caption-attachment-4135206\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135206\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-5.jpg\" alt=\"Go through Google's Security Checkup for a step-by-step review of every item Google's system identifies as a potential security issue.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135206\" class=\"wp-caption-text\">Google\u2019s Security Checkup helps you review the security of your account, step-by-step.<\/figcaption><\/figure>\n<h2 id=\"administrator\">Use Google Workspace? Ask an administrator for help<\/h2>\n<p>If you use Gmail and Google Workspace as part of an organization (e.g., work or school), an administrator may be able to do an additional review of your account access data. To do this, the administrator will need to sign in to the admin console. From the Admin console, they might go to https:\/\/admin.google.com\/ac\/, select your account, then review security settings as well as connected apps and devices (<strong>Figure F<\/strong>).<\/p>\n<p><strong>Figure F<\/strong><\/p>\n<figure id=\"attachment_4135208\" aria-describedby=\"caption-attachment-4135208\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135208\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-6.jpg\" alt=\"From the Admin console, they might go to https:\/\/admin.google.com\/ac\/, select your account, then review security settings as well as connected apps and devices.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135208\" class=\"wp-caption-text\">A Google Workspace administrator may review user account security settings and device access details.<\/figcaption><\/figure>\n<p>Next, admins might review all login information by going to the Investigation Tool, then filtering by user log events and your account email address (<strong>Figure G<\/strong>). Because this information is centrally logged by the system, access records will remain, even if the person accessing your account attempts to cover their tracks, such as by locally deleting browser history.<\/p>\n<p><strong>Figure G<\/strong><\/p>\n<figure id=\"attachment_4135211\" aria-describedby=\"caption-attachment-4135211\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-article wp-image-4135211\" src=\"http:\/\/cloudnewshub.com\/wp-content\/uploads\/2023\/07\/how-to-check-if-someone-else-accessed-your-google-account-7.jpg\" alt=\"An admin filtering by user log events and your account email address.\" width=\"770\" height=\"433\"><figcaption id=\"caption-attachment-4135211\" class=\"wp-caption-text\">For organizational accounts, a Google Workspace administrator may review audit logs for account sign ins.<\/figcaption><\/figure>\n<h2 id=\"what\">What\u2019s your experience?<\/h2>\n<p>If you\u2019ve wondered whether someone else has accessed your Google account, what steps have you taken? What did you learn when you completed the above access review of your Google account? Mention or message me on Mastodon (<a href=\"https:\/\/mastodon.social\/@awolber\" target=\"_blank\" rel=\"noopener noreferrer\">@awolber<\/a>) to let me know any additional steps you suggest.<\/p>\n<p> <!-- default newsletter at the end --> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Review your recent Gmail access, browser sign-in history and Google account activity to make sure no one other than you has used your account. Illustration: Andy Wolber\/TechRepublic Whenever a computer is out of your direct view and control, there\u2019s always a chance that someone other than you can gain access. A person who returns from [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":95479,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[40,783,154,287],"tags":[],"class_list":["post-95478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-cloudsync","category-google","category-security"],"_links":{"self":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/95478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=95478"}],"version-history":[{"count":0,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/posts\/95478\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=\/wp\/v2\/media\/95479"}],"wp:attachment":[{"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=95478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=95478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudnewshub.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=95478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}