How to understand that someone is following our correspondence on the web and take all necessary measures
In recent years, there are more and more scandals associated with data leakage on the Web and spying on people – both for individuals and for companies or even states. In the light of all these events, each Internet user wants to secure his presence on the world wide web and to achieve for himself the realization of the right to privacy of correspondence.
Today, Google is the most advanced developer of software and services, so there is nothing surprising that the security system (as well as the control system) is truly advanced for the company. You can check the security of your data in Google services with a few clicks.
To get started, go to your Google account, where we select the tab “Security and Login”, scroll down the page and select the item “Recently Used Devices” (View connected devices).
There we will see a list of all devices through which the entry was made over the last 28 days. If there is a suspicion that you didn’t come into your profile from any smartphone, you can close it with one click. After that, from this smartphone will have to enter a password to get into your account.
The Yandex mail service also has a security and entry control system. To begin, go to the “Account Management”, where we find the item “History of inputs.” All devices and browsers through which the Yandex account was accessed will be displayed there (even there is a map with a connection point). If desired, you can change the password with one click.
In addition, there is a separate security system in the mail service itself. Push the characteristic gear, select the item “Security”, and then we find the item “Visitors Log”. There you can see all the entrances and actions carried out by you (or not only you) in the mailbox with the dates of these operations.
In the popular social network “VKontakte” with security is very simple. One page is dedicated to it. To check everything, you need to go to “Settings”, select “Security”, and then find the link “Show activity history”. It will show from where and from which operating system logged in to the account. If you wish, you can complete all the sessions in one click. After that, “VC” will again request to enter a password on all computers, except this one.
After the scandal with the leakage of personal data, Facebook is literally obsessed with security. So, we go first to the “Settings”, then select the item “Security and Login” and see there a very detailed presentation of information about all current (and not only) sessions. If necessary, you can complete any suspicious one click. In general, the system resembles the one used in VK, only it provides more information.
Viber also has its own security monitoring systems. By tradition, select “Settings”, then “Account” and in it the item “Computers and Tablets.” All unfamiliar devices, as in “Vkontakte” or Facebook can be turned off. After that, with them at the new entrance you will need to enter a password.