Home > FAQ > Security > Account Security > What should I do if my account was compromised
When your email account is compromised, here are several steps you should take to secure your account and avoid it from being compromised again:
The first thing you should do is to run an end-to-end antivirus scan on your computer, as most hackers collect passwords using malware that has been installed on a device. Run a deep scan - not just a quick scan - to eliminate any forms of threats. If you did not go through this step before changing your password, you might get attacked again; as the hacker may obtain your new password from the malware that is still hidden within your device.
Also, be sure that your antivirus program and security patches are always up-to-date. If possible, set your computer to update these patches automatically so that you are protected from new attacks as soon as possible.
Once your device is free of malware, change your password immediately. You can follow the guidelines listed here on how to create a strong password. It does not have to be hard to remember, but it must be hard to guess.
It is advisable to inform your customers, vendors and anyone who is in your email contact list so that they know that you have been hacked, as hackers may use your email account to do illegal stuffs like, sending scam mail asking them to make payment, or sending dangerous attachments that would make them the new victims. Alert them not to fall for email sent by your mail address that doesn't seem right and do not click on any suspicious links. This can in turn, help to stop the spread of the malware.
When you use email clients to access or download your mails, Secured Socket Layer (SSL) is the secure method of providing authentication and encryption for the connection between your computer and the server. While most mail clients are already supporting STARTTLS for plain text connection, it is still considered less secure than using SSL. You may see the mail server settings for SSL connection in this article.
Lookafter's Suspicious Access Prevention (SAP) feature is a way to block login attempts that come from other countries that are not permitted by you. Enabling this feature reduces the chances of your account being accessed by hackers that are trying to access from other areas, even if they have got your password. Read this article for more information about SAP and how to configure it on your webmail account.
Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the junk settings level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox.
Lookafter's 2Auth enhances the security of your email account by requiring more than your password to access your account. This additional layer of security significantly reduces the risk of unauthorized access and provides better protection for your email account. Find out more about this feature: Getting Started with 2Auth