Fraud Prevention Policy
What is Email Hacking?
Email hacking, also known as email account compromise or email hijacking. refers to unauthorized access to an email account, allowing unauthorized individuals to read the account owner’s emails, send messages on their behalf, impersonate others, and potentially engage in fraudulent activities like financial scams.
What Can You Do?
Change Your Password: The first and most crucial step is to change your email account password. Use a strong and unique password that includes a combination of letters, numbers, and special characters.
Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification in addition to your password.
Scan for Malware: Run a full antivirus and anti-malware scan on your computer or device to ensure there isn’t any malicious software installed.
Review Sent and Deleted Items: Check your sent and deleted folders for any emails that you didn’t send or delete. This can help you identify if someone else has been using your account.
Review Account Recovery Settings: Make sure that your account recovery options, such as alternate email addresses and phone numbers, haven’t been changed to prevent you from regaining access to your account.
Contact Your Email Service Provider: Reach out to your email service provider’s customer support for assistance and to report the suspected hack. They may have specific protocols for addressing compromised accounts.
How Does It Happen?
Phishing: Phishing emails are designed to trick users into revealing their login credentials. Victims may unknowingly provide their username and password to a fake login page, which hackers then use to access the email account.
Social Engineering: Hackers may manipulate or deceive individuals into revealing their email login information through methods like impersonation, pretexting, or baiting.
Malware and Keyloggers: Malicious software can infect a user’s computer or device, capturing keystrokes and sending login credentials to hackers.
Stolen Credentials: Hackers may acquire email login credentials through data breaches, where usernames and passwords from other services are leaked.
Spyware: Hackers may install spyware on a victim’s device, allowing them to monitor and capture email login credentials and activity.
How To Prevent Email Hacking?
Use Strong Passwords: Create unique and complex passwords for your email account. Use a mix of upper and lower-case letters, numbers, and special characters.
Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification, typically a code sent to your mobile device.
Regularly Update Passwords: Change your email password periodically, at least every few months.
Beware of Phishing: Be cautious when clicking on links or downloading attachments from unfamiliar or suspicious emails.
Update Software and Security Settings: Keep your operating system, antivirus software, and email client up to date to patch security vulnerabilities.
Use a Secure Connection: Always use a secure, encrypted connection (HTTPS) when accessing your email account, especially when using public Wi-Fi networks.
What is Email Hacking?
Email hacking, also known as email account compromise or email hijacking. refers to unauthorized access to an email account, allowing unauthorized individuals to read the account owner’s emails, send messages on their behalf, impersonate others, and potentially engage in fraudulent activities like financial scams.
How Does It Happen?
Phishing: Phishing emails are designed to trick users into revealing their login credentials. Victims may unknowingly provide their username and password to a fake login page, which hackers then use to access the email account.
Social Engineering: Hackers may manipulate or deceive individuals into revealing their email login information through methods like impersonation, pretexting, or baiting.
Malware and Keyloggers: Malicious software can infect a user’s computer or device, capturing keystrokes and sending login credentials to hackers.
Stolen Credentials: Hackers may acquire email login credentials through data breaches, where usernames and passwords from other services are leaked.
Spyware: Hackers may install spyware on a victim’s device, allowing them to monitor and capture email login credentials and activity.
What Can You Do?
Change Your Password: The first and most crucial step is to change your email account password. Use a strong and unique password that includes a combination of letters, numbers, and special characters.
Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification in addition to your password.
Scan for Malware: Run a full antivirus and anti-malware scan on your computer or device to ensure there isn’t any malicious software installed.
Review Sent and Deleted Items: Check your sent and deleted folders for any emails that you didn’t send or delete. This can help you identify if someone else has been using your account.
Review Account Recovery Settings: Make sure that your account recovery options, such as alternate email addresses and phone numbers, haven’t been changed to prevent you from regaining access to your account.
Contact Your Email Service Provider: Reach out to your email service provider’s customer support for assistance and to report the suspected hack. They may have specific protocols for addressing compromised accounts.
How To Prevent?
Use Strong Passwords: Create unique and complex passwords for your email account. Use a mix of upper and lower-case letters, numbers, and special characters.
Enable Two-Factor Authentication (2FA): This adds an extra layer of security by requiring a second form of verification, typically a code sent to your mobile device.
Regularly Update Passwords: Change your email password periodically, at least every few months.
Beware of Phishing: Be cautious when clicking on links or downloading attachments from unfamiliar or suspicious emails.
Update Software and Security Settings: Keep your operating system, antivirus software, and email client up to date to patch security vulnerabilities.
Use a Secure Connection: Always use a secure, encrypted connection (HTTPS) when accessing your email account, especially when using public Wi-Fi networks.