No Products in the Cart
Your email account is the link to all things YOU in the digital world. Hackers have figured this out, which is why they love targeting email accounts. Once they have gained access to your email account, it makes it much easier to reset passwords, change account information and lock you out of all your other accounts.
Your email account can give access to your Facebook account, Amazon account, banking and more. Their intention is either by obtaining personal information which can be used for identity theft, making purchases with your linked credit cards, or obtaining bank account information and withdrawing funds.
Since your email account can link to so many things, this is why it is so important to make sure your email account remains secure.
Do not use passwords which you use for any other accounts. Need help choosing a strong, memorable password? Check out our blog on using a passphrase.
Two factor or two step verification greatly increases the security of your accounts. By enabling this feature, any time you sign into your account on a new device, a second step of receiving a verification code is required. This verification code is sent to a trusted device you have set up on your account. Since SIM card cloning is becoming possible and used as a strategy to intercept verification codes sent to phones via text message, it is preferred to use two step verification or two factor verification using an offline code generator. Such code generator, for example, is the Google Authenticator App. This app is widely supported across many different email providers.
Visit the following link to set up 2-Step Verification for your google account:
Visit the following link for the instructions on the Apple Support Article for enabling Two Factor Authentication on your Apple ID.
Some email providers do not support this additional security feature. It is recommended to not use email accounts from these providers as the account may easily be hacked. For example, your internet service provider may give you a free email account under their own domain. However, most of these email accounts are very basic and do not support these verification methods and therefore are vulnerable to attack. These accounts without two factor or two step verification can be cracked with ease, using brute force. A computer algorithm is set to crack the password by entering all possible password combinations, starting with the most common password combinations.