Managing technology in today's world is challenging. It requires each of us to diligently mange every account we have (email, social media, financial institution, etc) and take active steps with each account to protect them from bad things. We recommend that you regularly check your accounts for signs of unwanted activity and make necessary corrections.
Third Party Apps
The links below are pages where various apps allow you to review any third party access that you've granted; each one offers the ability to revoke that access.
- Google - Apps with access to your account
You may also be interested in this article from Google about third-party sites & apps with access to your account.
- Facebook - Apps and Websites
If you see something that says "You don't have any active apps...", that's very good! If you see apps listed under "Active", be sure you really need to have those apps there. If possible, just delete them.
- Twitter - Apps and Devices
Some apps provide a robust set of tools packaged as a "security check up". These tools can help you to find vulnerabilities which you didn't know exist.
- Google Security Checkup
- Facebook Security Checkup
- Twitter Account Security Tips
- Instagram Security Tips
Check for Unwanted Gmail Access
We also recommend that you check your Gmail account regularly for signs of unauthorized access.
IMPORTANT: If you suspect that there has been unauthorized access to your account, change your password immediately.
We often see evidence of unauthorized access in the following areas:
- Check your "Sent Mail" folder (on the left while looking at your Inbox) to see if there are any emails going out from your account that you don't recognize. Often, when a hacker gains access to an account, they will use that account to send many spam email messages. If you see messages like this, just delete them.
- Check the Activity on your account. While looking at your Inbox on a traditional computer, scroll all the way to the bottom and click the "Details" link in the lower right. This provides information about the last activity on your account. Make sure you recognize everything shown.
NOTE: When checking your account activity, be aware that a server on our network performs checks and maintenance on our accounts multiple times per day. This activity will appear in your list like this:
This server is named "netsrv.snc.edu" and its I.P. address is 184.108.40.206. As the entry shows, it is an "authorized application", so do not be alarmed when you see this; it's normal.
To access the following settings, click the gear icon in the upper right and select "Settings":
- Check your "Accounts" settings to make sure your name has not changed. Look at the "Send mail as" setting. Sometimes a hacker will change this so that when they send out spam with your account, the sender name is different than your name. To change this, click the "edit info" link on the right.
- Check your "Filters and Blocked Addresses" to see if there are filters that you don't recognize. Often times we'll see that a hacker has created a filter that automatically forwards all incoming messages to another email account. If you see a filter that shouldn't be there, use the "delete" link on the right to remove it.
- Check your "Forwarding and POP/IMAP" to see if there are settings that you don't recognize. Sometimes a hacker will add a new forwarding address to your account, or they'll enable POP or IMAP so that they can gain access to your account from another app. POP and IMAP should normally be disabled unless you have a specific reason for turning them on.
If you see anything that you need help with, please give us a call or stop by and see us at the ITS Service Desk.