With waves of cyber attacks on legitimate websites, it makes sense that you know how to check your trusted online service companies for nefarious activity. It’s probable that the spammers and con-artists have ex-filtrated and bartered your email and already have one of your passwords from the past. This problem happened because a web site administrator didn’t take necessary precautions to safe guard your login credentials.
In a previous post, I covered the topic from the perspective of understanding and mitigating the consequences of the spammer thief problem.
In this video, I show you how to enter your Microsoft email account to see the nature of the login attempts with your username. I’ve included other video links for you to see how you can do the same for your accounts at Google, Yahoo!, Facebook, and Twitter.
Unusual Activity on Your Account means Hackers are Working to Gain Access to Your Account. This video covers the following topics:
–18 Ways to Cut the Risk of a Security Breach
–Guarding Your Reputation is Important
–An Ounce of Prevention
–Elements of a Trusted Cloud Service Partner
–Finding out Bogus Logins to Your Email Account
–Using Two Factor Authentication (2FA)
–Checking Recent Login Activity
–Proactive IT Partners
|An ounce of prevention with Security is worth a pound of cure|
|Video to check if your Google account has been hacked|
|Video to see if your Yahoo! account has been compromised|
|How to see if your Facebook account has been compromised|
|Checking your Facebook helpdesk for hacked accounts|
|Checking your Twitter account to see if it has been hacked.|
|If your Twitter account has been breached, or you’ve been locked out and need a password reset.|