How to Prevent Hacking of Email Accounts Protect Your Account and Devices from Hackers and Malware
Total Page:16
File Type:pdf, Size:1020Kb
how to prevent hacking of email accounts Protect your account and devices from hackers and malware. No one wants to become compromised by hackers or malware. Use this guidance to help you protect your accounts and devices. Protect your accounts. It's important that you protect your accounts whether it's a personal account such as a Microsoft account, or a work or school account someone in your organization created for you. Take precautions with sensitive info. Don't send emails that include sensitive information such as passwords, credit card numbers, passport numbers, or other government issued identification such as a social security number or other tax related identification. Watch out for scams. Watch out for phishing attacks which try to trick you into providing sensitive information, or clicking a malicious link or attachment. Some examples of phishing scams look like messages from what appears to be a legitimate source such as a bank or an official looking institution. The message invites you to sign in with your email address and password, but it's actually a fake website. Other scams look like emails from someone you know which asks you to click a link or open an attachment. Phishing messages usually have links or attachments. When you click the link in the message or open the attachment, your computer can become infected or an attacker can gain access to your content. If you receive an email that looks even slightly suspicious, do the following: Hover over the link and look for the name of the actual website the link is sending you to. Make sure it's what you expect and not misspelled. Go to the legitimate website using your own saved favorite or bookmark, or from an internet search, instead of clicking a link in the message. If you receive a message from someone you know, but it looks a bit unusual, it could mean the sender's email account and contact list was compromised. Contact the sender directly and describe the mail you just received and ask if it was legitimate. Use two-factor authentication. Two-factor authentication (2FA), also called two-step verification, or multi-factor authentication (MFA) is an extra layer of security to ensure that only you are accessing your account. When you set this up, any time you sign in to your account from an unrecognized computer or other device, or if you add your account to an app or a service for the first time, you're prompted to verify that it's okay. The verification message can be sent via an authentication app such as the Microsoft Authenticator app on your smartphone, a text message, an email sent to an alternate address, or a phone call which requires you to enter a pin. If your work or school accounts are using Microsoft 365, your Microsoft 365 admin or IT department may have enabled this for all accounts in the organization. If so, you'll be prompted to take this extra step. For a personal Microsoft account, you can set this up yourself and indicate your preferred verification method. For example, you can request verification from an authentication app such as the Microsoft Authenticator app, a text message, or alternate email account. Protect your password. Don't use the same password for all your accounts. Make sure your password is strong and avoid using actual words. The current recommendations for strong passwords include at least 12 characters, a combination of upper and lowercase letters, at least one number from 0-9, and a symbol. Tip: Third-party online services are available to help you generate and remember unique passwords for sites you visit regularly. Protect your phone or tablet. Only run and install apps from a legitimate source such as the app store for your device. If you're using Microsoft 365, use Microsoft apps which work better with Microsoft 365 and are more secure. Keep your devices, and any software or mobile apps you're using up-to-date. Many of the updates you receive are security fixes so be sure to install operating system updates, and any software or app updates. Enable the lock feature on your phone or table that requires you to unlock the device with a PIN, fingerprint, or facial recognition. Protect a computer running Windows 10 or a Mac. The following are specific things you can do if you're computer is running Windows 10, or if you have a Mac. Turn on BitLocker device protection. Bitlocker protects data when devices are lost or stolen. BitLocker Drive Encryption provides full disk encryption on Windows 10 PCs. If the device is lost or stolen unauthorized users can’t gain access to files on the protected drives, including files synced from OneDrive for Business. Protect your PC with Microsoft Defender. When you start up Windows 10 for the first time, Microsoft Defender is on and actively helping to protect your PC by scanning for malware (malicious software), viruses, and security threats. Microsoft Defender uses real-time protection to scan everything you download or run on your PC. Windows Update downloads updates for Microsoft Defender automatically to help keep your PC safe and protect it from threats. Turn on Windows Firewall. You should always run Windows Firewall even if you have another firewall turned on. Turning off Windows Firewall might make your device (and your network, if you have one) more vulnerable to unauthorized access. Use FileVault to encrypt your Mac disk. Disk encryption protects data when devices are lost or stolen. FileVault full-disk encryption helps prevent unauthorized access to the information on your startup disk. Protect your mac from malware. Microsoft recommends you install and use reliable antivirus software on your Mac. You can also reduce the risk of malware by using software only from reliable sources. The settings in Security & Privacy preferences allow you to specify the sources of software installed on your Mac. Turn on firewall protection. Use firewall settings to protect your Mac from unwanted contact initiated by other computers when you’re connected to the Internet or a network. Without this protection your Mac might be more vulnerable to unauthorized access. 11 Ways to Prevent Your Email From Getting Hacked. #1. Whenever possible, configure your Internet connection to always use HTTPS. This is the "https" that appears before the "www" in a Web address, and the https is preceded by a padlock icon. For Gmail, this works by clicking Settings in the top right; select the General tab, then hit Always use HTTPS, then save this setting. This option is not available for those who access email via Hotmail. #2. Do not open unfamiliar emails. If you open one you think is from someone you know but realize it's not, delete immediately. Do not click any links in the message or send the sender personal or banking information. Once you open that link, your computer could become infected by a phishing scam and your information stolen. #3. Install anti-virus, anti-spyware and firewall on your computer and keep them updated. Automated updates are the ideal choice. #4. Do not log into your accounts from an untrusted computer (e.g., at the coffee house, library), or one that you don't maintain (e.g., friends' and family's). Even if you trust your friends and family, their computer could be infected from spyware. #5. Make sure your passwords, plus security questions and answers are strong. Every six months, change your passwords. Never use the same password for different accounts. A strong password has upper and lower case letters plus numbers and punctuation, forming a non-English word. For questions and answers, they don't have to be true; false information cannot be researched or discovered on your Facebook page, such as the name of "your first pet" when you never had a pet: "Fuzzie-Glow" -- who's ever going to figure that out? #6. Find out just how secure your passwords are. Some setups indicate strength with a rating of "weak" to "strong." Always choose "strong." If there's no rating, go to How Secure Is My Password to see how fast your account can be hacked. On the "How Secure" site, don't type in your actual password if you're skittish about doing that (even though the site is secure and will never release it anywhere), but type in something similar. So if your password is "catlover," type in "horselover" and see what happens. #7. Your password should not be on the list of the most popular passwords. Here is the full list. If yours is there, change it immediately, even if you must give up an easy-to-type sequence. #8. Enable two-step verification if you use Google for any activity. The two-step adds additional security to a Google account. After entering your username and password, you'll then enter in a code that Google sends out via voicemail or text when you sign in. This will make it harder for someone to guess a password. #9. Use a password manager. This service eliminates the need to type in a password at log-in; log in with one click. A master password eliminates having to remember all your different passwords. #10. You may think your password is unique because it's a jumble of characters, but it may not be very strong simply because it's not long enough. The longer that uniqueness, the more uncrackable the password will be. #11 Use a virtual private network software to encrypt any wireless communications. A virtual private network (VPN) is a network set up to communicate privately over a public network.