User Tools

Site Tools


faq:network_and_security:what_to_do_when_account_is_compromised

Home > FAQ > Security > Account Security > What should I do if my account was compromised

What should I do if my account was compromised?

When your email account is compromised, here are several steps you should take to secure your account and avoid it from being compromised again:

1) Check and update your computer's security

The first thing you should do is to run an end-to-end antivirus scan on your computer, as most hackers collect passwords using malware that has been installed on a device. Run a deep scan - not just a quick scan - to eliminate any forms of threats. If you did not go through this step before changing your password, you might get attacked again; as the hacker may obtain your new password from the malware that is still hidden within your device.

Also, be sure that your antivirus program and security patches are always up-to-date. If possible, set your computer to update these patches automatically so that you are protected from new attacks as soon as possible.

2) Change your password and make it stronger

Once your device is free of malware, change your password immediately. You can follow the guidelines listed here on how to create a strong password. It does not have to be hard to remember, but it must be hard to guess.

3) Notify your contacts about your account being compromised

It is advisable to inform your customers, vendors and anyone who is in your email contact list so that they know that you have been hacked, as hackers may use your email account to do illegal stuffs like, sending scam mail asking them to make payment, or sending dangerous attachments that would make them the new victims. Alert them not to fall for email sent by your mail address that doesn't seem right and do not click on any suspicious links. This can in turn, help to stop the spread of the malware.

4) Consider adopting SSL/TLS for your IMAP, POP3 and SMTP connection

When you use email clients to access or download your mails, Secured Socket Layer (SSL) is the secure method of providing authentication and encryption for the connection between your computer and the server. While most mail clients are already supporting STARTTLS for plain text connection, it is still considered less secure than using SSL. You may see the mail server settings for SSL connection in this article.

5) Make sure SAP is turned on to prevent login from unauthorised countries

Lookafter's Suspicious Access Prevention (SAP) feature is a way to block login attempts that come from other countries that are not permitted by you. Enabling this feature reduces the chances of your account being accessed by hackers that are trying to access from other areas, even if they have got your password. Read this article for more information about SAP and how to configure it on your webmail account.

6) Check and configure your junk settings

Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contain links and attachments, do not click or download them as well. In Lookafter, you can set the junk settings level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox.

7) Enable 2Auth (Second Factor Authentication)

Lookafter's 2Auth enhances the security of your email account by requiring more than your password to access your account. This additional layer of security significantly reduces the risk of unauthorized access and provides better protection for your email account. Find out more about this feature: Getting Started with 2Auth

faq/network_and_security/what_to_do_when_account_is_compromised.txt · Last modified: 2023/10/30 14:01 by vikki