{"id":356,"date":"2014-02-28T08:16:31","date_gmt":"2014-02-28T02:46:31","guid":{"rendered":"http:\/\/www.stellarinfo.co.in\/blog\/?p=356"},"modified":"2020-04-15T14:13:51","modified_gmt":"2020-04-15T08:43:51","slug":"steps-to-put-into-practice-if-your-email-account-is-hacked","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/","title":{"rendered":"Steps to Put into Practice if Your Email Account is Hacked"},"content":{"rendered":"<p>Internet is a great and epic service that makes almost everything available to us in a quick and the \u2018so-called\u2019 secure manner. I am adding \u2018so-called\u2019 before calling the Internet services secure because the security of our content on the Internet more or less is in our own hands. In other words, online services that require you provide your personal as well as confidential information allow you in exchange choose a username and a password that you must keep confidential. As far as your email account is concerned, you can share the username with your friends and others, but not the password indeed.<\/p>\n<p>Internet is a great and epic service that makes almost everything available to us in a quick and the \u2018so-called\u2019 secure manner. I am adding \u2018so-called\u2019 before calling the Internet services secure because the security of our content on the Internet more or less is in our own hands. In other words, online services that require you provide your personal as well as confidential information allow you in exchange choose a username and a password that you must keep confidential. As far as your email account is concerned, you can share the username with your friends and others, but not the password indeed.<\/p>\n<p><strong>Tip 1: Take back the access and get into your email account<\/strong><\/p>\n<p>Since the email account after being hacked is inaccessible, you must try taking back the access at the very first step. For this, log on to the website of your email service provider, and then try to log in with your username and password. In case your account is accessible, change the password and remember not to use real words as the password. Instead, use a combination of letters, digits, and special characters to make you password secure and near about impossible to guess.<\/p>\n<p><strong>Tip 2: Have a check on other linked email\/social accounts<\/strong><\/p>\n<p>Once you get into your email account, make sure other email and social accounts (such as Facebook, Twitter, LinkedIn, and more) linked to your email account, having the same password are untouched. The biggest threat in such situations could be to your Internet banking. I recommend not keeping the same password for multiple accounts having the username common. Besides, do not set the password same as the username or the email ID, as it eases for the hackers to get into your email\/social accounts.<\/p>\n<p><strong>Tip 3: Keep checking the Spam folder at regular intervals<\/strong><\/p>\n<p>The purpose of the hackers to get a hold of your email or social account might be anything like they want to access your contacts information, to send spam and phishing emails, to abuse someone, or etc. They might want to access your personal information like you banking transaction details, which is certainly not acceptable. To know if any such event is occurred, keep checking Spam and Sent Items folders in your mailbox.<\/p>\n<p><strong>Tip 4: Avoid in-future threats<\/strong><\/p>\n<p>In case your email account is secure or you got back the access to your email, be ready for such threats to encounter in the future. To avoid these threats, do not use real words as the password or use a combination of letters, numbers, and special characters as the password.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Internet is a great and epic service that makes almost everything available to us in a quick and the \u2018so-called\u2019 secure manner. I am adding \u2018so-called\u2019 before calling the Internet services secure because the security of our content on the Internet more or less is in our own hands. In other words, online services that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6],"tags":[],"class_list":["post-356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-virus-spyware","has_thumb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to prevent Email account hacking<\/title>\n<meta name=\"description\" content=\"Email can be hacked easily, what to do when email is hacked. Read to know more on how to prevent Email account hacking\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent Email account hacking\" \/>\n<meta property=\"og:description\" content=\"Email can be hacked easily, what to do when email is hacked. Read to know more on how to prevent Email account hacking\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog - Tips and Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-28T02:46:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-15T08:43:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Girish\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Girish\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent Email account hacking","description":"Email can be hacked easily, what to do when email is hacked. Read to know more on how to prevent Email account hacking","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/","og_locale":"en_GB","og_type":"article","og_title":"How to prevent Email account hacking","og_description":"Email can be hacked easily, what to do when email is hacked. Read to know more on how to prevent Email account hacking","og_url":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/","og_site_name":"Stellar Data Recovery Blog - Tips and Solutions","article_published_time":"2014-02-28T02:46:31+00:00","article_modified_time":"2020-04-15T08:43:51+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg","type":"image\/jpeg"}],"author":"Girish","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Girish","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/"},"author":{"name":"Girish","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/0200f068dc76e3a44f8510d280528bba"},"headline":"Steps to Put into Practice if Your Email Account is Hacked","datePublished":"2014-02-28T02:46:31+00:00","dateModified":"2020-04-15T08:43:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/"},"wordCount":544,"commentCount":0,"publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg","articleSection":["Virus &amp; Spyware"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/","name":"How to prevent Email account hacking","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg","datePublished":"2014-02-28T02:46:31+00:00","dateModified":"2020-04-15T08:43:51+00:00","description":"Email can be hacked easily, what to do when email is hacked. Read to know more on how to prevent Email account hacking","breadcrumb":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#primaryimage","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2014\/02\/steps-to-put-into-practice-if-your-email-account-is-hacked.jpg","width":1000,"height":600,"caption":"Steps to Put into Practice if Your Email Account is Hacked"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.co.in\/blog\/steps-to-put-into-practice-if-your-email-account-is-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Steps to Put into Practice if Your Email Account is Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website","url":"https:\/\/www.stellarinfo.co.in\/blog\/","name":"Stellar Data Recovery Blog - Tips and Solutions","description":"","publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization","name":"Stellar Data Recovery","url":"https:\/\/www.stellarinfo.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","width":181,"height":52,"caption":"Stellar Data Recovery"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/0200f068dc76e3a44f8510d280528bba","name":"Girish","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c43aa311fe399b0e1b0c69ba4891a73e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c43aa311fe399b0e1b0c69ba4891a73e?s=96&d=mm&r=g","caption":"Girish"},"description":"Girish is a blogger and writer. He has over 6 years of experience in Data Recovery and Data Eraser technology. In his free time, he writes about technical tips and tutorials.","url":"https:\/\/www.stellarinfo.co.in\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/comments?post=356"}],"version-history":[{"count":1,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions"}],"predecessor-version":[{"id":358,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/356\/revisions\/358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media\/7538"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media?parent=356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/categories?post=356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/tags?post=356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}