Here are ways you can regain control if your account has been compromised or hacked.
What are some signs that one of my online accounts may have been hacked?
- There are posts you never made on your social network page – they may be posts that encourage your friends to click on a link or download an app.
- A friend, family member or colleague reports getting email from you that you never sent. Your information was lost via a data breach, malware infection or lost/stolen device.
If you believe an account has been compromised, take the following steps:
- Notify all of your contacts that they may receive spam messages appearing to come from your account. Tell your contacts they shouldn’t open messages or click on any links from your account and warn them about the potential for malware.
- If you believe your computer is infected, be sure your security software is up to date, and scan your system for malware. You can also use other scanners and removal tools.
- Change passwords to all accounts that have been compromised and other key accounts as soon as possible.
- If you cannot access your account because a password has been changed, contact the service provider immediately and follow any steps the provider offers for recovering an account.
A wireless network means connecting an internet access point – such as a cable or DSL modem – to a wireless router. Going wireless is a convenient way to allow multiple devices to connect to the internet from different areas of your home. However, unless you secure your router, you’re vulnerable to people accessing information on your computer, using your internet service for free and potentially using your network to commit cybercrimes.
Here are ways to secure your wireless router:
Change the name of your router: The default ID – called a service set identifier” (SSID) or “extended service set identifier” (ESSID ) – is assigned by the manufacturer. Change your router to a name that is unique to you and won’t be easily guessed by others. Change the preset password on your router: Leaving a default password unchanged makes it much easier for hackers to access your network. You should change it as soon as possible. Review security options: When choosing your router’s level of security, opt for WPA2, if available, or WPA – these levels are more secure than the WEP option. Create a guest password: Some routers allow for guests to use networks via separate guest passwords. If you have many visitors to your home, it’s a good idea to set up a guest network. Use a firewall: Firewalls help keep hackers from using your device to send out your personal information without your permission. While antivirus software scans incoming email and files, a firewall is like a guard, watching for attempts to access your system and blocking communications with sources you don’t permit.
Passwords are like keys to your personal home online. You should do everything you can prevent people from gaining access to your password. You can further secure your accounts by using additional authentication methods.
- Password Protection Rules-
- Make your password complex
- Use a unique password for each of your important accounts
- Do not allow Internet Browser to store passwords for you
- Do not write your password anywhere
- Do not share your password
- Set up your password recovery options
- Use additional authentication methods like OTP to verify your identity
Social media platforms have become an integral part of online lives. Social networks are a great way to stay connected with others, but you should be wary about how much personal information you post.
Learn about and use the privacy and security settings on social networks. They are there to help you control who sees what you post and manage your online experience in a positive way Protect your reputation on social networks. What you post online stays online. Think twice before posting Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data or commit other crimes such as stalking.
Protect Your Info
- Don’t post phone
- Don’t post address
- Avoid status updates with time and place references
- Don’t use Places
- Avoid photos that reveal locations like home , workplace or school
- Be skeptical of new people you meet online, even if they seem nice.
Choose Your Friends
- Only friend people you know well
- Don’t get into contest for who has the most friends
- Keep your group of friends small
If someone is harassing or threatening you, remove them from your friends list, block them ,save an evidence like screen shot and report them to the site administrator & police.
For Facebook Privacy settings
Parental controls are available on most internet-enabled devices like computers, smart phones, tablets and gaming systems. When enabling parental controls, use age-appropriate settings to filter, monitor and block your child’s activities. As a parent, you’ll likely want to allow your children to use technology for communications, learning and more. You’re also going to want to be sure that your children use the internet safely and securely. Parental controls are a great way to be proactive about your child’s online safety and activities.
What parents need to know, and issues to raise with kids about living their lives online.
Filtering and blocking limit access to specific websites, words or images.
Blocking outgoing content prevents your children from sharing personal information online and via email.
Limiting time allows parents to set time limits for how long their children are online and the time of day they can access the internet.
Monitoring tools alert parents to their children’s online activity without blocking access and can be used with or without the child’s knowledge. Some software can record which websites a child has visited. Other programs display warning messages when children visit certain websites.
Google Family Safety Center Tips https://safety.google/families/
Use strong passwords, pass codes or other features such as touch identification to lock your devices. Use security and privacy settings on websites and apps to manage what is shared about you and who sees it. Many of us download apps for specific purposes, such as planning vacations, and no longer need them afterwards, or we may have previously downloaded apps that are longer useful or interesting to us. It’s a good security practice to delete all apps you no longer use. Keep security software current on all devices that connect to the internet Some stores and other locations look for devices with WiFi or Bluetooth turned on to track your movements while you are within range. Disable WiFi and Bluetooth when not in use. Fraudulent text messages, calls and voicemails are on the rise. Just as with email, mobile requests for personal data or immediate action are almost always scams. Public wireless networks and hotspots are not secure, which means that anyone could potentially see what you are doing on your laptop or smartphone while you are connected to them. Limit what you do on public WiFi, and avoid logging in to key accounts like email and financial services. Consider using a virtual private network (VPN) or a personal/mobile hotspot if you need a more secure connection.