Fortifying your email account against hacking attacks

Fortifying your email account against hacking attacks

But WHY?

If a hacker gains access to your main e-mail account, they will be able to control (that's right, control!) your:

Amazon, Facebook, Linkedin, e-banking, track ALL previous purchases and control every single account you created using that e-mail. Because resetting your account password likely goes through your e-mail - and if sms is involved, they can simply claim "you lost your phone" and still use your e-mail.

Creating an un-hackable e-mail is the most important aspect of securing your digital universe, both personally and professionally.

You will need:

  1. Your smartphone
  2. Your computer

Think about the last 7 years – how many websites have you registered with, how many usernames and passwords created… how many times you have used the same password or small, simple variations of it, for valuable accounts like your e-mail or your online banking? By this time, most of these resources have been hacked at least once (Including LinkedIn) and the passwords used there have been compromised, with or without their/your knowledge.

Having a secure e-mail account is imperative to your privacy.

In this short article I am going to show you how to create a nearly un-hackable e-mail account using just your phone and computer in less than 10 minutes.

Let’s start!

Since most people are familiar with Gmail, let us use this e-mail provider – although the same rules apply to others and you can replicate them at your favorite e-mail provider with ease.

I chose Gmail because of the connected services Google offers – Google Drive, Google Docs, Youtube, Google Voice, Google Plus, etc. Secure one, secure them all!

I suppose you already have a Gmail address you would like to protect – step one is to protect it with a good, unique password which you are not using anywhere else. And by unique I mean really unique – not just adding a symbol or a number at the end of your regular password which you use everywhere. Choose something you will remember easily – a phrase works best, as in this example:

https://xkcd.com/936/

No alt text provided for this image

Go to this link - https://myaccount.google.com/intro/signinoptions/password - to change your password.

Once done, move on to the next step.

Setting up a recovery phone number

It is important NOT to use your cell phone number as a recovery phone, because intercepting an SMS is cheap and affordable – now that even small crime rings can afford the equipment necessary, SMS authentication is considered insecure. Every person you ever contacted knows your phone number - we don't need that kind of publicity when protecting your most important communication tool.

We will open a Google Voice account which will provide us with a free US number for use for our recovery process. Remember, if you lose access to your phone and / or the password to your gmail account, you will not be able to recover it if you use Google Voice, as they are essentially using the same account. Backup your phone regularly!

Go to https://voice.google.com/ and create an account, you will get a free US number to use with it. Once you get the number, note it down – as it will be your secure phone number for verifications of this account and perhaps others, if you choose to.

Now go to https://myaccount.google.com/security and in the Account Recovery options, set up your new phone number as a recovery phone.

Now let us enable 2-Step Verification

To do this, download and install the Google Authenticator app on your phone. You will need it for this account and many more – as many services now offer 2-step verification of identity via this or similar apps.

Go to https://myaccount.google.com/signinoptions/two-step-verification and follow the prompts to enable it on your phone – either via the Google app or via the Authenticator app, I would recommend downloading and setting up both, just in case.

After doing that, perform a full backup of your phone to your computer – in case you lose your phone, you should be able to restore the app to a new one without losing access to your account forever.

Backup e-mail address

It is recommended to set up an e-mail account only you know about, which exists only for recovery purposes, with a unique password – and not used for anything else but recovery. Don’t use your work e-mail or a throwaway e-mail account used for registrations on different websites – as these are often compromised and their passwords – exposed. Remember: the security of your e-mail account is as strong as this backup e-mail address. Protect it in the same way or better to ensure your account’s safety. One service I would recommend for backup e-mail accounts setup is ProtonMail - of course, you should enable mailbox encryption and 2-factor authentication there, too.

Yubikey

If you value your e-mail account as much as at least $100, buy 2 Yubikey Neo devices and set them up for login authentication with your Gmail account. You need to set up both, because if you lose one, you should have at least the other stored somewhere in a safe as a recovery option.

reid sarah

Realtor at Emrald Homes

2 年

The truly scary thing about undiscovered lies is that they have a greater capacity to diminish us than exposed ones. When people cheat in any arena, they diminish themselves-they threaten their own self-esteem and their relationships with others by undermining the trust they have in their ability to succeed and in their ability to be true. Cheating is the most disrespectful thing one human being can do to another. If you aren’t happy in a relationship, end it before starting another one. Those who cheat on their partners who are loyal to them; don’t deserve them. It is a trashy attitude to disrespect a person who is loyal in a relationship, by cheating on him or her. If you succeed in cheating someone, don’t think that the person is a fool realise that the person trusted you much, more than you deserve. If you noticed any suspicious act on your partner if he or she is cheating. You need to write Williamscyberghost (@) gmall, c o m to help you remotely spoof on the target phone to retrieve text messages, call logs, social media activities, bank information and many more. They deliver best services and get you the peace of mind you deserve. Email: [email protected] CALL OR TEXT: +1 (602) 456-1862 Warm Regard

回复
Chaddy Huussin

Executive Director, Architecture, Product, Strategy, Distributed Ledger Technology & Digital Assets Security

5 年

there is no such thing as un-hackable email account !!

define "un-hackable"?? if one have your device you use to check your emails from compromised - they will have access to your emails once you follow all these steps to get access to it... is it hackable?

Giles Raymond DeMourot

Retired Independent Consultant, Author

6 年

There is no such thing. My gmail account was hacked once (but Google saw it happen and warned me). I have seen secured email systems like Protonmail being hacked.

回复

要查看或添加评论,请登录

Alexander Sverdlov的更多文章

社区洞察

其他会员也浏览了