Saturday 2 June 2018

How to protect your YouTube channel?


You have a YouTube channel and you are not sure it is well protected. You see every day on the complaints with forums for hacking, theft and other malicious acts. So you decide to put in place an effective protection strategy that no one can access your YouTube channel.

Where to start?
Since your YouTube channel is linked or associated with a Google Account that you used to you connect, it is the account that must be protected. Your plan will contain the password, the devices with which you often connect the applications you allow to access your channel, emails and phone numbers that you use to be notified in case of doubtful account login. If you can control these factors and verify periodically, it is difficult that your chain is pirated.

The first step is to change your password in a way that contains lowercase letters, uppercase letters, and numbers. Make it has no connection with the information in your account, such as name, first name or date of birth, for example; or with your pseudonyms and your passwords on other sites.

To change your password, follow these steps:
 Log into your Google account, click your logo in the upper right of the screen, click the icon “My account”; on the screen that appears, under “Log and Security”, click “Connect to Google.” Click the arrow to the right of the “Password”. You will be asked to sign in with your current password, then create your new password.

The second step is determining your switching devices to your account. You have, for example, three devices you use: a computer, a tablet and a mobile phone. These are devices that must be included in your settings. So any connection with another device that is not in your settings you will be reported.

How to check your appliances in your settings?
Log into your Google account, click your logo in the upper right of the screen, click the icon “My account”; on the screen that appears, under “Log and Security” click “Activity on the devices and events relating to security”; a list of devices appears, examine it, do not let that (in our example) your computer, tablet and mobile phone.

The third step is the review of applications with access to your account. Still under “Log and Security”, click “Applications with account access”, an application list appears, manage applications, leaving only those that are reliable and really needed.

If you now make a summary of your actions, it follows that you have a new password, your login devices are well defined, and applications with access to your account well defined. Is it sufficient protection?

At this stage, you stay still vulnerable because if a user happens to know your password, he can log in to your account with his own apparatus, you will be informed, but you cannot stop him, or only do so belatedly. This is why the “two-step verification” option is required. What is its purpose?

Every time someone tries to connect to your account using a new device must, in addition to your password, enter a code that Google sends only on your own phone number that found in the validation parameters in two steps.

How to get there? 
Log into Google and browse to the page of the “two-step verification” here, or by typing “two-step verification” on the Google search engine.

Once on the page click on “Start” and follow the instructions indicating a telephone number and possibly your account recovery email. You can also select the devices for which you do not wish to receive code.
Once enabled, you are informed.

Do not forget to put a lock code to your usual appliances connection and periodically check the security settings for your account. 
Though not recommended, but you can at any time turn off the “Two-step verification.”

Sources: Creator Academy YouTube, Google.

                                                                                                                                   by Bachirrr

No comments:

Post a Comment