Search
  • Videos
  • 5G
  • Windows 10
  • Cloud
  • Innovation
  • Security
  • Tech Pro
  • more
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
  • Newsletters
  • All Writers
    • Log In to ZDNET
    • Join ZDNet
    • About ZDNet
    • Preferences
    • Community
    • Newsletters
    • Log Out
  • Menu
    • Videos
    • 5G
    • Windows 10
    • Cloud
    • Innovation
    • Security
    • Tech Pro
    • Apple
    • ZDNet Academy
    • Microsoft
    • Mobility
    • Hardware
    • Executive Guides
    • Best VPN Services
    • See All Topics
    • White Papers
    • Downloads
    • Reviews
    • Galleries
    • Videos
    • TechRepublic Forums
      • Log In to ZDNET
      • Join ZDNet
      • About ZDNet
      • Preferences
      • Community
      • Newsletters
      • Log Out
  • us
    • Asia
    • Australia
    • Europe
    • India
    • United Kingdom
    • United States
    • ZDNet around the globe:
    • ZDNet China
    • ZDNet France
    • ZDNet Germany
    • ZDNet Korea
    • ZDNet Japan

How to protect your Google Account with the Advanced Protection Program

1 of 17 NEXT PREV
  • Google Advanced Protection Program

    Google Advanced Protection Program

    To learn more about Google Advanced Protection Program, as well as to kick off the activation process, head over to https://landing.google.com/advancedprotection/.

    The process takes about 15 minute (assuming you already have the hardware, if not, you'll need to wait for them to arrive) so this isn't something to do when you're in a rush, on a deadline, or heading out the door on a business trip. You will also need to log in with all your devices as the process will revoke access to your accounts for all your devices.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • You will need two hardware keys

    You will need two hardware keys

    You will need one wireless Bluetooth key, and a second USB backup key. I recommend buying the pack that Google offers. While you can use only USB authentication keys for the process, you won't be able to use them to log into your account with mobile devices, which means that you will run into all sorts of headaches.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Get the hardware you need

    Get the hardware you need

    Google offers you a link to buy the hardware you need. If the pack is sold out (as it was in the UK at the time of writing), you can usually still find the two keys sold separately.

    Once you have the keys, you're ready to begin.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • First, log in with your username and password

    First, log in with your username and password

    This is to prove to Google that you are indeed you.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Register the two security keys

    Register the two security keys

    Now you need to go through the process of registering the two security keys.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Get your first security key ready

    Get your first security key ready

    The process of registering the keys is simple enough and you'll be guided through each step.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Almost done...

    Almost done...

    Just follow the on-screen prompts.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Give the key a name

    Give the key a name

    The name is just so you know which was used to log into your account. Give it something memorable.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • That's one key done

    That's one key done

    That process only took seconds. Now onto the second key.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • This is the same as for the first key

    This is the same as for the first key

    First, get it ready...

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Registering the second key

    Registering the second key

    ... plug it in and tap the button on it ... 

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Almost done

    Almost done

    Finally, give it a name.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • That's the security hardware registered

    That's the security hardware registered

    The process of registering the security keys should only take you a couple of minutes. 

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Turn on Advanced Protection

    Turn on Advanced Protection

    Are you sure you want to turn on Advanced Protection? You can still back out at this stage.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Read through all the small print

    Read through all the small print

    Before clicking on that "Turn On" button, I suggest that you read, and then reread what activating it entails. Remember, you'll be logged out of your account on all your devices and you'll need to go through the process of logging back in everywhere.

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • Last chance!

    Last chance!

    Even after clicking 'Turn On," you get one final chance to abort the process. 

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

  • And you're done

    And you're done

    And you're done! Well, not exactly, because you need to log back into your account on all your other devices. But you now have all the benefits of Google's Advanced Protection Program securing your account. 

    Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

    Caption by: Adrian Kingsley-Hughes

1 of 17 NEXT PREV
  • Google Advanced Protection Program
  • You will need two hardware keys
  • Get the hardware you need
  • First, log in with your username and password
  • Register the two security keys
  • Get your first security key ready
  • Almost done...
  • Give the key a name
  • That's one key done
  • This is the same as for the first key
  • Registering the second key
  • Almost done
  • That's the security hardware registered
  • Turn on Advanced Protection
  • Read through all the small print
  • Last chance!
  • And you're done

If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, and political campaign teams – is for you. Here's how to enable the Google Advanced Protection Program.

Read More Read Less

Google Advanced Protection Program

To learn more about Google Advanced Protection Program, as well as to kick off the activation process, head over to https://landing.google.com/advancedprotection/.

The process takes about 15 minute (assuming you already have the hardware, if not, you'll need to wait for them to arrive) so this isn't something to do when you're in a rush, on a deadline, or heading out the door on a business trip. You will also need to log in with all your devices as the process will revoke access to your accounts for all your devices.

Published: February 19, 2019 -- 16:40 GMT (08:40 PST)

Caption by: Adrian Kingsley-Hughes

1 of 17 NEXT PREV

Related Topics:

Security Google Security TV Data Management CXO Data Centers
LOG IN TO COMMENT
  • My Profile
  • Log Out
| Community Guidelines

Join Discussion

Add Your Comment
Add Your Comment

Related Galleries

  • 1 of 2
  • Who is really in the driver’s seat? Unknown digital threats to your car’s security

    The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk. ...

  • Data leaks: The most common sources

    This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years. ...

  • Facebook's worst privacy scandals and data disasters

    Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.

  • The best VPN services: Our 10 favorite vendors for protecting your privacy

    Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet. ...

  • How to avoid being phished during holiday shopping season

    Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep ...

  • Many of 2018's most dangerous Android and iOS security flaws still threaten your mobile security

    Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android. ...

ZDNet
Connect with us

© 2019 CBS Interactive. All rights reserved. Privacy Policy | Cookies | Ad Choice | Advertise | Terms of Use | Mobile User Agreement

  • Topics
  • All Authors
  • Galleries
  • Videos
  • Sponsored Narratives
  • About ZDNet
  • Meet The Team
  • Site Map
  • RSS Feeds
  • Reprint Policy
  • Manage | Log Out
  • Join | Log In | Membership
  • Newsletters
  • Site Assistance
  • ZDNet Academy
  • TechRepublic Forums