User Tools

Site Tools


faq:network_and_security:what_to_do_when_account_is_compromised

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
faq:network_and_security:what_to_do_when_account_is_compromised [2022/04/19 11:55] vikkifaq:network_and_security:what_to_do_when_account_is_compromised [2023/10/30 14:01] (current) – [6) Check and configure your junk settings] vikki
Line 25: Line 25:
 ===== 6) Check and configure your junk settings ===== ===== 6) Check and configure your junk settings =====
 Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the [[faq:email:junk_filtering_setup_for_users|junk settings]] level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox.   Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the [[faq:email:junk_filtering_setup_for_users|junk settings]] level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox.  
 +
 +
 +===== 7) Enable 2Auth (Second Factor Authentication) =====
 +Lookafter's 2Auth enhances the security of your email account by requiring more than your password to access your account. This additional layer of security significantly reduces the risk of unauthorized access and provides better protection for your email account. Find out more about this feature: [[faq:security:2auth|Getting Started with 2Auth]]
faq/network_and_security/what_to_do_when_account_is_compromised.1650340502.txt.gz · Last modified: 2022/04/19 11:55 by vikki