Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Credentials used in two-factor authentication vary depending on which services are available. It largely depends on the hardware solution; for example, you could have a SMS message sent to your smartphone, or a phone call with an automated recording. Other times it could be a PIN, or a biometric system using a fingerprint scanner or facial recognition software.

You’ll find two-factor authentication on most websites that require personal information from the user, like shopping, banking, or email websites. Gmail specifically offers a setting that lets you set up two-factor authentication in just a few minutes.

  • Log into the computer of your choice, but make sure to keep your phone nearby. The two-factor authentication setup process needs to be performed on a computer.
  • Access Gmail, and click on the icon in the top-right corner of the screen. It will be whatever your account’s profile picture is, or just an icon with the first letter of your name. Click it to make a menu box appear, and select My Account.
  • This brings you to your Google Account area. On the left side of the screen, you’ll see the option Signing in to Google right underneath the Sign-in & Security heading. Click it.
  • You’ll be signed into your Google account. Once you’ve done so, look for 2-Step Verification. Make sure it’s set to On. Then, you’ll see an introductory screen. Next, click Get Started and re-enter your password.
  • You’ll be asked to plug in your phone number. Once you select your country from the drop-down list and input your preferred phone number (a smartphone is recommended), you’ll select to either receive a call, or a text message.
  • Select Try It. You should receive a verification code sent to your phone via your previous selection. Plug the code into the confirmation screen and click Next.
  • Google will ask if you’d like to turn on two-factor authentication. Since you obviously do, Gmail will display a confirmation window. It will then send you a confirmation email. The next time you log into your Gmail account, you’ll be asked to enter a code that’s been sent to your selected phone.

It’s that easy; you now have your Gmail account protected via two-factor authentication. For more handy tech tips, be sure to subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 06 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Computer Google Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips IT Support Mobile Devices Innovation Smartphone Windows 10 Ransomware Gmail Hardware Network Security Backup Bandwidth Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Microsoft Office Office Networking Content Filtering Data storage Cybercrime Windows Data Website Experience Smartphones Mobile Device Management Employer-Employee Relationship Money Network Two-factor Authentication History Small Business Managed Service Provider Outlook Phishing App Mobile Computing communications Wireless Technology Big Data Safety Android Unified Threat Management Apple Quick Tips Best Practice Alert Firewall Word Heating/Cooling Music Displays Cryptocurrency Laptop Business Management IBM Google Docs End of Support Education Competition Cleaning Holiday Entrepreneur YouTube Processors Presentation Black Market Domains Office Tips Writing LiFi Staffing BYOD Downtime Streaming Media Help Desk Hacker Passwords Micrsooft Visible Light Communication Disaster Application Data Management Customer Service Business Growth Robot Retail Advertising Recovery Society Sports Router Spam Google Wallet Office 365 Managed IT services Information Technology Running Cable Windows 8 Internet of Things Windows XP Saving Money IT Services Analytics Hosted Solution Lithium-ion battery Bluetooth Artificial Intelligence intranet Documents Tech Support Compliance Automation Drones Memory Social Social Networking Public Speaking Printer Browser Deep Learning Virtualization Virtual Desktop Wireless IP Address BDR Unified Communications Securty Document Management Government Encryption Law Enforcement Vendor Management Keyboard SaaS VoIP Augmented Reality Search User Cortana Hard Drives Proactive IT Remote Computing Network Congestion Monitors Shortcut DDoS Save Money
QR-Code