Today, most users have a Google account, either to use email or enjoy other of its many services. For security, ask to link the phone number with the user account, which will be used, for example, to verify our user credentials. But what happens if our beloved smartphone is lost or stolen? Or if we change the number? In these situations, we will be interested in unlinking our phone number to prevent a third party from having access to our account, and therefore, to our data.
Every user with an Android device has a Google account linked to their smartphone. Although there are ways to skip it, the great variety of services and benefits that it offers us becomes a very big temptation. In addition, the security improvements it brings to our account are yet another incentive, especially with regard to the protection of our personal data, such as:
As a security measure, when we access any Google service, if we have the option enabled, we will receive an alert on our phone if we identify that we are accessing the service through another device other than the usual one or if we are connecting from a location unknown.
However, what happens if we have lost our mobile phone, it is stolen or we change our number? It is possible that, if the only way to access the account again is through the mobile phone that we do not have, we may encounter problems to reset the access codes or regain control of the account.
In this situation, we will be interested in unlinking or changing the phone from the Google account to avoid problems.
Table of Contents
A first step we can take is to configure the account to stop receiving the Google notice each time we log in from another device or a location that is not the usual one in exceptional cases, for example, if we go on a trip and connect from another net. For it:
In any case, we recommend thinking twice before disabling the two-step verification option as it provides an extra layer of security for our Google account. If we still want to disable the warnings and continue to maintain the same level of security, we can do so using the security codes.
Thus, when they ask us for the verification code :
If we continue with the intention of unlinking our mobile phone, the next step will be to delete our recovery phone number. For it:
In this way, we can continue to recover access to our account through an email and not through a notification to our phone.
Before taking this step, keep in mind that, among the benefits of linking your phone number to the Google account, is being able to log in with your device. In this way, instead of writing our email or name as credentials, our phone number and password will suffice.
After the process, Google will inform us that if we delete the number, some of the services may be affected.
We should know that it may take a week before we can use a new phone number to verify our identity and take certain actions, such as changing your password. This is a standard Google security procedure.
All the processes detailed above can be done on our mobile device. Accessing Settings> Google> Manage your Google account. From here, the process will be the same.
As we have seen, there are many options with which to verify the authentication of our accounts, either through another phone number, an alternative email or even security codes.
Remember that we can improve our security by applying extra measures to protect our account and the personal data stored in it with the advice and resources of OSI.
Were you aware that you could unlink your phone number? Have your phone ever been stolen or lost and you were unable to access your Google account? Share your opinion and experiences with other users and stay up-to-date with OSI’s cybersecurity publications to enjoy the benefits of technology.
The “cloudification” of information systems has led to a radical transformation of IT professions. IT… Read More
In today's fast-paced digital world, reliable and secure internet connectivity is the lifeline of any… Read More
Digital tools are revolutionizing various industries, and Human Resources (HR) is no exception. From optimizing… Read More
In today's digital world, mobility is essential. Mobile applications have become an integral part of… Read More
Managed IT Services is experiencing rapid changes. With advancements in cloud computing, cybersecurity threats, and… Read More
WISHEW App And Platform Officially Launched In The United States On World Wish Day, Now… Read More