(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Credentials used in two-factor authentication vary depending on which services are available. It largely depends on the hardware solution; for example, you could have a SMS message sent to your smartphone, or a phone call with an automated recording. Other times it could be a PIN, or a biometric system using a fingerprint scanner or facial recognition software.

You’ll find two-factor authentication on most websites that require personal information from the user, like shopping, banking, or email websites. Gmail specifically offers a setting that lets you set up two-factor authentication in just a few minutes.

  • Log into the computer of your choice, but make sure to keep your phone nearby. The two-factor authentication setup process needs to be performed on a computer.
  • Access Gmail, and click on the icon in the top-right corner of the screen. It will be whatever your account’s profile picture is, or just an icon with the first letter of your name. Click it to make a menu box appear, and select My Account.
  • This brings you to your Google Account area. On the left side of the screen, you’ll see the option Signing in to Google right underneath the Sign-in & Security heading. Click it.
  • You’ll be signed into your Google account. Once you’ve done so, look for 2-Step Verification. Make sure it’s set to On. Then, you’ll see an introductory screen. Next, click Get Started and re-enter your password.
  • You’ll be asked to plug in your phone number. Once you select your country from the drop-down list and input your preferred phone number (a smartphone is recommended), you’ll select to either receive a call, or a text message.
  • Select Try It. You should receive a verification code sent to your phone via your previous selection. Plug the code into the confirmation screen and click Next.
  • Google will ask if you’d like to turn on two-factor authentication. Since you obviously do, Gmail will display a confirmation window. It will then send you a confirmation email. The next time you log into your Gmail account, you’ll be asked to enter a code that’s been sent to your selected phone.

It’s that easy; you now have your Gmail account protected via two-factor authentication. For more handy tech tips, be sure to subscribe to Carceron’s blog.


No comments yet
Already Registered? Login Here
Friday, 30 September 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Tip of the Week Microsoft Business Management Managed Service Provider Software Cloud Workplace Tips Backup Saving Money Small Business Hardware Data Productivity Gadgets Hackers Business Computing Mobile Office Business Email Hosted Solutions Malware Google IT Services Quick Tips Social Media IT Support Virtualization Mobile Devices Upgrade Business Continuity Users Passwords Smartphones Microsoft Office Network Windows Disaster Recovery WiFi Server Miscellaneous Innovation VoIP User Tips Computer Mobile Computing Windows 10 Mobile Device Management Vendor Management Communication Efficiency Operating System Smartphone Unified Threat Management Marketing BYOD Remote Computing Apps The Internet of Things Holiday History IT Consultant Facebook Android Analytics Health Wireless Technology Apple Alert Ransomware Going Green Windows 8 Bring Your Own Device Hard Drives Lithium-ion Battery Network Security Printer Office Tech Support Content Filtering Big data Information Technology Saving Time Outlook Firewall Collaboration Hiring/Firing Remote Monitoring Data Management Save Money Spam Phishing Employer-Employee Relationship Gmail Search Computers Save Time Humor Smart Phones Antivirus Best Practice Automation Bandwidth Maintenance Tutorials Computer Repair Proactive IT Browser User Error Managed IT services Fax Server Education Avoiding Downtime PowerPoint Router Budget Help Desk Money Sports Two-factor Authentication Wireless Administration Running Cable Internet of Things Intranet Business Intelligence Excel App Hacking iPhone Current Events User Document Management Mobile Device Phone System Customer Service Downtime Government USB Legal Net Neutrality Data storage Recovery Password Programming Cybercrime Inbound Marketing Flexibility Cortana Digital Payment Customer Relationship Management Social Networking Risk Management Office Tips Bluetooth Comanaged IT Presentation Computing Laptop Computer Accessories Processors Comparison communications Augmented Reality Documents Pain Points Hosted Solution Printer Server Text Messaging Retail SaaS VPN Gaming Console Website Virus Black Market Virtual Desktop Network Congestion Compliance Experience Chrome Business Growth Heating/Cooling Encryption IBM Networking Company Culture End of Support Safety Thin Client Social Cost Management Artificial Intelligence Statistics Streaming Media Adminstration Writing Outsourced IT Lifestyle Harddrive DDoS Leadership Unified Communications Tablet Staffing Download switches Word Paperless Office BDR Permissions Microchip Skype Google Docs File Sharing Disaster Public Speaking HIPAA Electronic Payment Regulations Touchscreen Solid State Drive Entrepreneur Teamwork Identity Theft Securty Hacker IT consulting Society Best Available Virtual Reality LinkedIn Micrsooft Wearable Technology External Harddrive IP Address Storage Read IT service Windows XP Mouse Human Resources Operating Systerm Keyboard Value Computing Infrastructure Robot CIO organize PDF Memory Music Webinar Shortcut Adroid Wi-Fi Troubleshooting Upgrades Display Ebay Flash Efeciency Telephone Systems Business Owner Deep Learning Content Management Pirating Information Domains eWaste Settings LiFi Recycling GPS Co-Managed IT Banking Specifications Monitors Archive Microserver Environment Language Update Visible Light Communication 3D Google Wallet Competition Business Metrics Entertainment Analytic Displays Video Surveillance Office 365 Turn Key Riske Management Managed IT Online currency Advertising Trending Drones Point of Sale Application Digital Signature Chromebook YouTube Debate Work/Life Balance Law Enforcement Twitter

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive