faq:network_and_security:what_to_do_when_account_is_compromised
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |
faq:network_and_security:what_to_do_when_account_is_compromised [2022/04/19 11:55] – vikki | faq:network_and_security:what_to_do_when_account_is_compromised [2023/10/30 14:01] (current) – [6) Check and configure your junk settings] vikki |
---|
===== 6) Check and configure your junk settings ===== | ===== 6) Check and configure your junk settings ===== |
Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the [[faq:email:junk_filtering_setup_for_users|junk settings]] level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox. | Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the [[faq:email:junk_filtering_setup_for_users|junk settings]] level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox. |
| |
| |
| ===== 7) Enable 2Auth (Second Factor Authentication) ===== |
| Lookafter's 2Auth enhances the security of your email account by requiring more than your password to access your account. This additional layer of security significantly reduces the risk of unauthorized access and provides better protection for your email account. Find out more about this feature: [[faq:security:2auth|Getting Started with 2Auth]] |
faq/network_and_security/what_to_do_when_account_is_compromised.1650340502.txt.gz · Last modified: 2022/04/19 11:55 by vikki