User Tools

Site Tools

Writing /data/web/www/ failed
Unable to save cache file. Hint: disk full; file permissions; safe_mode setting.
Writing /data/web/www/ failed
Writing /data/web/www/ failed
Unable to save cache file. Hint: disk full; file permissions; safe_mode setting.

Home > FAQ > Security > Account Security > How to protect your VO accounts from being compromised or hacked

How to protect your VO and email accounts

In this Information age where Internet has become a common tool for everyone worldwide, it is not rare to hear that someone’s account has been hacked or accessed by an unauthorized party.
Email and other online accounts are at constant risks of being hacked if no precaution is taken to secure them. Here are several tips to prevent your account from being compromised:

Choose A Secure Password

It is best to use a strong password that is difficult to guess. The stronger your password, the more protected your computer will be from hackers and other malicious software

  • Use a combination of uppercase letters, lowercase letters, symbols and numbers in your password.
  • Use a password that is at least eight characters long.
  • Don’t use personal information in your password e.g. your user name, real name, phone number, domain name, etc.
  • Don’t use easy-to-guess passwords like “1234567”, “password”.
  • Don't use the same password for your email account with other online/website/social media accounts.
  • Change your password regularly.
  • MOST IMPORTANTLY Do not use back previous passwords. Always come up with a new one.

Guard Your Password

Do not reveal your password to others(even to your relatives). Do not write it down and place it on a visibly open area or store it where it can be easily accessed. Note it down and keep it somewhere safe for your future reference, in cases where you forgot the passwords. Make sure to use different passwords for different accounts.
If you feel that your password has been exposed, change it immediately (How to change my VO account password?). Do not recycle the password.

Beware of Phishing

At times you might receive emails that ask for your personal information and password. Do not reveal these information even if the email appears to come from a legitimate business partner/vendor/email provider, as phishing websites often mimic the actual look of a genuine website.
If you are suspicious that an email from your provider/partner is not genuine, contact the legitimate company through phone or via a separate email to verify whether the email is really sent by them.

  • Don’t click on links, files or open attachments in emails from unrecognized senders.
  • Don’t email sensitive or personal information over the Internet.
  • Communicate personal info only by phone or secure websites.
  • Always beware of popups. If you are not expecting any pop-up such as trusted payment gateways from the website and a pop-up still comes up, don’t click on its link or access its web addresses on your browser. Immediately close the pop-up before it even gets to load its contents.

Guard Against Spams

Be extra careful if you receive emails that guarantee wins, prizes and money transfers— they are mostly spam emails. Do not click on links resided in these emails, and do not reply them either.
You may set a higher sensitivity on your junk filtering settings to filter away these spam mails: Junk Filtering Settings.
Or, you can also blacklist the spam email sender: Blacklist an email sender.

Keep Your Device Clean of Malware and Viruses

Protect your computer with anti-virus, spam filters and firewall.
Make it a habit to scan your computer every now and then to keep your system healthy from malicious spyware.

Conceal Your Email Address

Although your email address is hardly a secret, there is no reason to disclose it when you don't need to. For instance, do not post your email address on social media or blog post as cybercriminals are constantly looking for these sources for new victims.
Other than that, think twice before subscribing to any newsletters, as some newsletter services are dishonest; they may “sell” your email address and contact details to other sources.

Turn On SAP Feature on VO

By default, your VO account is guarded by the Suspicious Access Prevention (SAP) setting, where by your account access is only open to the countries that are listed in your SAP's setting.
You can turn off this feature from your Profile settings. However, we strongly recommend not to disable this feature as it helps to prevent unauthorized user (from other countries) from accessing your VO account.

Use SSL/TLS for SMTP, IMAP, POP3 Connections

If you are using a third-party mail client for email access, it is recommended to use SSL/TLS encryption for SMTP, IMAP and POP3 connections, as it ensures the protection of user names, passwords, personal details and other sensitive information that are available in emails.
You may find out more about mail client configurations with SSL/TLS here.

Use Secure and Reliable Mail Client

There are many mail clients and applications available for smartphones and PC from the Internet, but some might undermine the security of email sent using your email account. The key point here is the setup process - if the mail client prompts you to provide only your email address and password, and does not ask you to enter server settings - beware that it might not be sending your mails through your legitimate email server.
In addition, some mail apps might store your password in plain text, which put your password at risk of being exposed.

Avoid Using Public Wi-Fi

Hackers often set up fake hotspot that tricks others into connecting to the network for free. This enable them to intercept and access to the victim's personal information, such as emails, passwords, credit card information, bank account details, and more.
Hackers can also use an unsecured Wi-Fi connection to distribute malware. If you allow file sharing across a network, they can easily plant infected software on your computer.
If you really need Internet connection while travelling or away from home, it is best to use your own private network, such as the hotspot from your smartphone.

Consider Enabling 2Auth (Second Factor Authentication)

2Auth, Lookafter's Second Factor Authentication feature, provides an additional layer of security to your email account by requiring you to input a one-time password (OTP) when you log in to your webmail. Find out more about this feature: Getting Started with 2Auth

faq/profile/how_to_protect_your_vo_accounts_from_being_compromised.txt · Last modified: 2023/09/29 17:24 by vikki