This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
faq:network_and_security:what_to_do_when_account_is_compromised [2020/07/01 17:49] – created vikki | faq:network_and_security:what_to_do_when_account_is_compromised [2023/10/30 14:01] (current) – [6) Check and configure your junk settings] vikki | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | [[: | ||
+ | |||
====== What should I do if my account was compromised? | ====== What should I do if my account was compromised? | ||
Line 9: | Line 11: | ||
===== 2) Change your password and make it stronger ===== | ===== 2) Change your password and make it stronger ===== | ||
- | Once your device is free of malware, change your password immediately. You can follow the guidelines listed [[faq: | + | Once your device is free of malware, change your password immediately. You can follow the guidelines listed [[faq: |
===== 3) Notify your contacts about your account being compromised ===== | ===== 3) Notify your contacts about your account being compromised ===== | ||
- | It is advised | + | It is advisable |
===== 4) Consider adopting SSL/TLS for your IMAP, POP3 and SMTP connection ===== | ===== 4) Consider adopting SSL/TLS for your IMAP, POP3 and SMTP connection ===== | ||
Line 19: | Line 21: | ||
===== 5) Make sure SAP is turned on to prevent login from unauthorised countries ===== | ===== 5) Make sure SAP is turned on to prevent login from unauthorised countries ===== | ||
- | AfterOffice's Suspicious Access Prevention (SAP) feature is a way to block login attempts that come from other countries that are not permitted by you. Enabling this feature reduces the chances of your account being accessed by hackers that are trying to access from other areas, even if they have got your password. Read [[faq: | + | Lookafter's Suspicious Access Prevention (SAP) feature is a way to block login attempts that come from other countries that are not permitted by you. Enabling this feature reduces the chances of your account being accessed by hackers that are trying to access from other areas, even if they have got your password. Read [[faq: |
+ | |||
+ | ===== 6) Check and configure your junk settings ===== | ||
+ | Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, | ||
+ | |||
+ | |||
+ | ===== 7) Enable 2Auth (Second Factor Authentication) ===== | ||
+ | Lookafter' |