Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Credentials used in two-factor authentication vary depending on which services are available. It largely depends on the hardware solution; for example, you could have a SMS message sent to your smartphone, or a phone call with an automated recording. Other times it could be a PIN, or a biometric system using a fingerprint scanner or facial recognition software.

You’ll find two-factor authentication on most websites that require personal information from the user, like shopping, banking, or email websites. Gmail specifically offers a setting that lets you set up two-factor authentication in just a few minutes.

  • Log into the computer of your choice, but make sure to keep your phone nearby. The two-factor authentication setup process needs to be performed on a computer.
  • Access Gmail, and click on the icon in the top-right corner of the screen. It will be whatever your account’s profile picture is, or just an icon with the first letter of your name. Click it to make a menu box appear, and select My Account.
  • This brings you to your Google Account area. On the left side of the screen, you’ll see the option Signing in to Google right underneath the Sign-in & Security heading. Click it.
  • You’ll be signed into your Google account. Once you’ve done so, look for 2-Step Verification. Make sure it’s set to On. Then, you’ll see an introductory screen. Next, click Get Started and re-enter your password.
  • You’ll be asked to plug in your phone number. Once you select your country from the drop-down list and input your preferred phone number (a smartphone is recommended), you’ll select to either receive a call, or a text message.
  • Select Try It. You should receive a verification code sent to your phone via your previous selection. Plug the code into the confirmation screen and click Next.
  • Google will ask if you’d like to turn on two-factor authentication. Since you obviously do, Gmail will display a confirmation window. It will then send you a confirmation email. The next time you log into your Gmail account, you’ll be asked to enter a code that’s been sent to your selected phone.

It’s that easy; you now have your Gmail account protected via two-factor authentication. For more handy tech tips, be sure to subscribe to Evolve IT’s blog.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 09 February 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Google Computer Windows 10 IT Support Mobile Devices Innovation Smartphone Gmail Hardware Network Security Ransomware Facebook Microsoft Office Office Operating System Backup Apps Business Continuity Disaster Recovery The Internet of Things Communication Social Media Hacking WiFi Bandwidth Data Windows Small Business Phishing Experience App Mobile Computing Big Data communications Safety Mobile Device Management Money Unified Threat Management Smartphones Network Quick Tips Managed Service Provider Outlook Firewall Content Filtering Wireless Technology Android Cybercrime Apple Website Best Practice Alert Employer-Employee Relationship Networking History Data storage Two-factor Authentication Laptop Cryptocurrency Displays Router IBM Google Docs Office 365 Education Cleaning Holiday Black Market End of Support Analytics YouTube Processors Saving Money Staffing intranet Office Tips Lithium-ion battery LiFi BYOD Downtime Passwords Writing Streaming Media Help Desk Disaster Social Networking Micrsooft Visible Light Communication Public Speaking Business Growth IP Address Data Management Virtualization Recovery Robot Advertising Society Sports Government Google Wallet Retail Augmented Reality Spam Keyboard Running Cable Search Information Technology User Windows 8 Hard Drives Internet of Things Hosted Solution Managed IT services Remote Computing Windows XP Shortcut IT Services Documents DDoS Artificial Intelligence Tech Support Heating/Cooling Compliance Word Drones Bluetooth Social Printer Automation Browser Business Management Memory Virtual Desktop Wireless Competition Securty Unified Communications Document Management Deep Learning Presentation Encryption Entrepreneur Law Enforcement BDR Domains SaaS VoIP Proactive IT Vendor Management Hacker Cortana Network Congestion Application Save Money Music Monitors Customer Service
QR-Code