User Tools

Site Tools


faq:network_and_security:what_to_do_when_account_is_compromised

What should I do if my account was compromised?

When your email account is compromised, here are several steps you should take to secure your account and avoid it from being compromised again:

1) Check and update your computer's security

The first thing you should do is to run an end-to-end antivirus scan on your computer, as most hackers collect passwords using malware that has been installed on a device. Run a deep scan - not just a quick scan - to eliminate any forms of threats. If you did not go through this step before changing your password, you might get attacked again; as the hacker may obtain your new password from the malware that is still hidden within your device.

Also, be sure that your antivirus program and security patches are always up-to-date. If possible, set your computer to update these patches automatically so that you are protected from new attacks as soon as possible.

2) Change your password and make it stronger

Once your device is free of malware, change your password immediately. You can follow the guidelines listed here on how to create a strong password. It does not have to be hard to remember, but it must have to be hard to guess.

3) Notify your contacts about your account being compromised

It is advised to inform your customers, vendors and anyone who is in your email contact list know that you have been hacked, as hackers may use your email account to do illegal stuffs like, sending scam mail asking them to make payment, or sending dangerous attachments that would make them the new victims. Alert them not to fall for email sent by your mail address that doesn't seem right and do not click on any suspicious links. This can in turn, help to stop the spread of the malware.

4) Consider adopting SSL/TLS for your IMAP, POP3 and SMTP connection

When you use email clients to access or download your mails, Secured Socket Layer (SSL) is the secure method of providing authentication and encryption for the connection between your computer and the server. While most mail clients are already supporting STARTTLS for plain text connection, it is still considered less secure than using SSL. You may see the mail server settings for SSL connection in this article.

5) Make sure SAP is turned on to prevent login from unauthorised countries

AfterOffice's Suspicious Access Prevention (SAP) feature is a way to block login attempts that come from other countries that are not permitted by you. Enabling this feature reduces the chances of your account being accessed by hackers that are trying to access from other areas, even if they have got your password. Read this article for more information about SAP and how to configure it on your webmail account.

6) Check and configure your junk settings

Most malware got through a device via spam mails. When you receive any emails that look suspicious, do not respond to them. If they contains links and attachments, do not click or download them as well. In AfterOffice, you can set the junk settings level to filter off spam mails. Be sure to turn it on so that you won't see those mails on your Inbox.

faq/network_and_security/what_to_do_when_account_is_compromised.txt · Last modified: 2020/07/01 17:53 by vikki