Home > FAQ > Security > Account Security > How to protect your VO accounts from being compromised or hacked
In this Information age where Internet has become a common tool for everyone worldwide, it is not rare to hear that someone’s account has been hacked or accessed by an unauthorized party.
Email and other online accounts are at constant risks of being hacked if no precaution is taken to secure them. Here are several tips to prevent your account from being compromised:
It is best to use a strong password that is difficult to guess. The stronger your password, the more protected your computer will be from hackers and other malicious software
Do not reveal your password to others(even to your relatives). Do not write it down and place it on a visibly open area or store it where it can be easily accessed. Note it down and keep it somewhere safe for your future reference, in cases where you forgot the passwords. Make sure to use different passwords for different accounts.
If you feel that your password has been exposed, change it immediately (How to change my VO account password?). Do not recycle the password.
At times you might receive emails that ask for your personal information and password. Do not reveal these information even if the email appears to come from a legitimate business partner/vendor/email provider, as phishing websites often mimic the actual look of a genuine website.
If you are suspicious that an email from your provider/partner is not genuine, contact the legitimate company through phone or via a separate email to verify whether the email is really sent by them.
Be extra careful if you receive emails that guarantee wins, prizes and money transfers— they are mostly spam emails. Do not click on links resided in these emails, and do not reply them either.
You may set a higher sensitivity on your junk filtering settings to filter away these spam mails: Junk Filtering Settings.
Or, you can also blacklist the spam email sender: Blacklist an email sender.
Protect your computer with anti-virus, spam filters and firewall.
Make it a habit to scan your computer every now and then to keep your system healthy from malicious spyware.
Although your email address is hardly a secret, there is no reason to disclose it when you don't need to. For instance, do not post your email address on social media or blog post as cybercriminals are constantly looking for these sources for new victims.
Other than that, think twice before subscribing to any newsletters, as some newsletter services are dishonest; they may “sell” your email address and contact details to other sources.
By default, your VO account is guarded by the Suspicious Access Prevention (SAP) setting, where by your account access is only open to the countries that are listed in your SAP's setting.
You can turn off this feature from your Profile settings. However, we strongly recommend not to disable this feature as it helps to prevent unauthorized user (from other countries) from accessing your VO account.
If you are using a third-party mail client for email access, it is recommended to use SSL/TLS encryption for SMTP, IMAP and POP3 connections, as it ensures the protection of user names, passwords, personal details and other sensitive information that are available in emails.
You may find out more about mail client configurations with SSL/TLS here.
There are many mail clients and applications available for smartphones and PC from the Internet, but some might undermine the security of email sent using your email account. The key point here is the setup process - if the mail client prompts you to provide only your email address and password, and does not ask you to enter server settings - beware that it might not be sending your mails through your legitimate email server.
In addition, some mail apps might store your password in plain text, which put your password at risk of being exposed.
Hackers often set up fake hotspot that tricks others into connecting to the network for free. This enable them to intercept and access to the victim's personal information, such as emails, passwords, credit card information, bank account details, and more.
Hackers can also use an unsecured Wi-Fi connection to distribute malware. If you allow file sharing across a network, they can easily plant infected software on your computer.
If you really need Internet connection while travelling or away from home, it is best to use your own private network, such as the hotspot from your smartphone.
2Auth, Lookafter's Second Factor Authentication feature, provides an additional layer of security to your email account by requiring you to input a one-time password (OTP) when you log in to your webmail. Find out more about this feature: Getting Started with 2Auth