Eight Steps Needed If Email Gets Hacked

At one time or another you’ve probably received and email from a contact or friend that was suspicious.  Their email account might have been hacked. Unfortunately, hacking occurs far too often and your own email may be targeted.  If you should become a victim of hacking there are eight steps that you need to take to reclaim your email and protect it.

"E-mail Postbox Shows Sending And Receiving Mail" by Stuart Miles FreeDigitalPhotos.net

“E-mail Postbox Shows Sending And Receiving Mail” by Stuart Miles FreeDigitalPhotos.net

Suzanne Kantra of Techlicious writes in What To Do When Your Email Gets Hacked the steps you need to take if this happens to you.  Some of Kantra’s steps are as follows:

Step #1: Change your password. This is the first thing that you need to do.  Be sure to make your new password strong by using a mixture of upper and lower case letters, numbers, and symbols.  Do not choose anything that could be easily guessed such as your name, and keep your email password different from other passwords.

Step #2: Reclaim your account. Hopefully the hacker didn’t change your password and lock you out of your account.  If that happens, you will need to reclaim your account.  Depending on the type of email account you have, this can be accomplished by using the “forgot your password” link, answering the security questions or using your backup email address. Please check with your specific provider Gmail, Outlook, Hotmail, Yahoo! or AOL.

Step #3: Enable two-factor authentication. It is also important to require a second form of authentication in addition to your password. You can do this in your email settings.  Once again, check with your specific provider. This will provide another layer of security when you log into your email account from a different device.

Step #4: Check your email settings. Check to be sure that the hacker didn’t change your settings to forward a copy of all your emails to themselves, added a spam signature, or  turned on an auto-responder.

Please be sure to read all of the steps here, and keep your email secure.

This entry was posted in Email hacking and tagged , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s