
In recent years, there have been more and more scandals related to data leakage on the Internet and surveillance of people - both individuals and entire companies or even states. In the light of all these events, every Internet user wants to secure his presence on the World Wide Web and achieve for himself the exercise of the right to privacy of correspondence.
1. Google

Today, it is Google that is the most advanced developer of software and services, so it is not surprising that the company's security system (as well as the control system) is really advanced. You can check the security of your data in Google services in a few clicks.
To get started, go to your Google account, where we select the "Security and Login" tab, scroll down the page and select the "Recently Used Devices" item (View connected devices).

There we will see a list of all devices through which the recording was logged in for the last 28 days. If there is a suspicion that it was not you who entered the profile from some smartphone, you can close access to it with one click. After that, you will have to enter a password from this smartphone to get into your account.
2. "Yandex"

The Yandex mail service also has a security and login control system. First, go to "Account Management", where we find the item "Login History". All devices and browsers through which the Yandex account was accessed will be displayed there (there is even a map with a connection point). If desired, you can change the password with one click.

In addition, there is a separate security system in the service mail itself. We press the characteristic gear, select the item "Security", and there we find the item "Journal of the registration of visits". There you can see all the logins and actions performed by you (or not only you) in the mailbox, indicating the dates of these transactions.
3. "VKontakte"

In the popular social network VKontakte, security is very simple. One page is dedicated to it. To check everything, you need to go to the "Settings", select the "Security" item, and then find the link "Show activity history". It will show where and from what operating system the account was logged in. If you wish, you can end all sessions with one click. After that, "VK" will again ask you to enter the password on all computers, except this one.
4. Facebook

In the aftermath of the personal data breach scandal, Facebook is literally obsessed with security. So, first go to the "Settings", then select the item "Security and Login" and see there a very detailed presentation of information about all current (and not only) sessions. If necessary, you can terminate any suspicious one with one click. In general, the system resembles the one used in VK, only it provides more information.
5. Viber

Viber also has its own security control systems. By tradition, select "Settings", then "Account" and in it the item "Computers and Tablets". All unfamiliar devices, as in "Vkontakte" or Facebook, can be disabled. After that, they will need to enter a password with a new login.
Want to learn more about online security? Here 5 rules to help protect yourself from cybercriminals and most types of attacks.