Wellness

What to do if your email account is stolen – and how to stop it happening again | Consumer affairs

Email accounts have become more than just a long -term communication method, turning into your digital world center, such as logging in to the user for hundreds of services from shopping to social. So when you forget your password, your email is stolen or penetrated, it can be a totally nightmare.

Here is what to do if the worst happens. Taking these steps quickly can help you return you to your email and protect many other associated accounts.

Once you find that your account has been stolen

  • Try to change your password from the login device already.

  • Use a familiar device on a familiar site that you repeatedly used your email account before, such as your computer or phone on your home. Use the same browser that has usually installed more than one.

  • Use the account recovery process for the provider, such as Google or MicrosoftAnd access to your account through your email or recovery phone if you have one.

  • Answer all the recovery questions as your best, including any old passwords you may remember, even if you know only part of the answer. Google and Microsoft You have tips you can follow. It may take up to 24 hours to be verified to recover your account.

  • If everything else fails, prepare a new email account so that you can take your login quickly for different sites and services to an account that you can control.

Once you return to your account or prepare a new account

  • Set a strong, unique, strong password for your email. The password should be at least 12 characters, but the better. Use a mixture of alphabet and private characters. Some tips include use A mixture of random words, An unforgettable lyrical quoteAnd avoid simple or guessing groups. Use Password Director To help you remember it and other important details.

  • Prepare the verification of two steps using the code generation app, instead of SMS text messages. Make sure to save the backup codes consisting of two steps in a safe place.

  • use The corridor key Instead of the password, which uses your device and vital measurements for your authentication and cannot be penetrated like the password.

  • Set an e -mail to recover and phone number to help return to your account if you cannot log in.

  • Prepare the largest possible number of safety questions that your account is allowed in settings and make them difficult to guess as possible. Make sure to write the answers in a safe place.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button