Review Connected Devices and Sessions
If phishing succeeds, one of the fastest signs is a session you do not recognize.
Checking connected devices is one of the easiest habits that gives you a real security signal.
What to check
- unknown device type,
- strange location,
- recent activity while you were asleep,
- sessions on devices you no longer own.
What counts as suspicious
Not every unusual location is proof of compromise. Sometimes it is:
- a VPN,
- a carrier routing issue,
- a stale session label.
But if you see several issues together, take it seriously:
- unknown device,
- wrong city,
- unexpected time,
- other settings changed.
That combination is enough to act.
What to do if something looks wrong
- Log out of unknown sessions.
- Change the password immediately.
- Review 2FA settings.
- Review email and phone recovery details.
Do not wait for more evidence. Treat unknown access seriously.
Good routine
You do not need to check sessions every day.
Good times to check:
- after clicking something suspicious,
- after entering credentials on a page you regret,
- after travel,
- after receiving support-related messages,
- as part of a monthly account review.
Flashcards
What is one of the fastest signs that phishing may have succeeded?
What should you do first if you see a clearly suspicious session?
Does one strange location automatically prove compromise?