{"id":114,"date":"2019-08-09T18:51:30","date_gmt":"2019-08-09T13:21:30","guid":{"rendered":"https:\/\/www.reliconstech.com\/blog\/?p=114"},"modified":"2019-08-09T18:58:28","modified_gmt":"2019-08-09T13:28:28","slug":"7-steps-to-protect-your-email-account-from-hackers","status":"publish","type":"post","link":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/","title":{"rendered":"7 Steps to Protect your Email account from hackers"},"content":{"rendered":"\n<p>If you use emails for your personal and professional use and are worried that someone might hack into your email account or see your activity, then this article is of help for you.<br><br>Wether you are a computer expert or a regular user, you need to follow some basics to keep the account secure.<br><br>As you would know, some people have nothing better to do then to create problems by looking into other people&#8217;s emails data; it may be for money, pleasure, or some other personal reasons. They can easily put your privacy at great risk. Here are some easy steps that you can follow and protect your personal email data.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong><span style=\"text-decoration: underline;\">Create a stronger password<\/span><\/strong><br><br> Cannot emphasise enough about the use of a strong password, majority of the hack events happen because someone is lazy enough to use an easily guessable password, like 12345, abcde or their birthdays. <br><br> A good password should be difficult for other people to guess but easy for you to remember. You can try to use a n online tool, ex. <a rel=\"noreferrer noopener\" aria-label=\"https:\/\/strongpasswordgenerator.com\/ (opens in a new tab)\" href=\"https:\/\/strongpasswordgenerator.com\/\" target=\"_blank\">https:\/\/strongpasswordgenerator.com\/<\/a> to create one.<br> <br><\/li><li><strong><span style=\"text-decoration: underline;\">Always logout once done<\/span><\/strong><br><br>To keep your Facebook and email account protected and keep your password safe, always remember to log out of the respective account, no matter where you are logging in from.<br><br><\/li><li><strong><span style=\"text-decoration: underline;\">Change your password often<\/span><\/strong><br><br>Changing your password on a regular basis might seem daunting, but is a very good idea to keep the account secure. It may not necessarily be every week, but once in a couple of months should be useful.<br><br><\/li><li><strong><span style=\"text-decoration: underline;\">Keep your computer updated<\/span><\/strong><br><br>Most users get hacked if their personal computers are infected with a virus or a malware, which steak data form your system and sends out to hackers. Keeping your system updated with latest patches, an updated anti-virus (<em>ex, AVG, Avast, McAfee, etc<\/em>) and an updated anti-malware (<em>ex. <\/em><a rel=\"noreferrer noopener\" aria-label=\"www.malwarebytes.org (opens in a new tab)\" href=\"https:\/\/www.malwarebytes.org\" target=\"_blank\"><em>www.malwarebytes.org<\/em><\/a>) goes a long way in protecting your privacy.<br><br><\/li><li><strong><span style=\"text-decoration: underline;\">Do not share your password with others<\/span><\/strong><br><br>It is just easier sometimes to share password with someone to get some jobs done quickly, but you are not sure about what kind of computers or intention the account is going to be used on, so it is always a better idea to keep it to yourself. Incase you had to share it for whatever reason, change it immediately once the job is done.<br><br><\/li><li><strong><span style=\"text-decoration: underline;\">Change the security questions and answers wisely<\/span><\/strong><br><br>Ok, so there\u2019s absolutely no point in having a week security question, \u201cMy birthday\u201d or \u201cMy current city\u201d. A lot of personal information is available online, thanks to social networks. On being the weakest links in the email security chain, security questions rank ahead of weak passwords. Have a stronger security question and answer, it just makes things difficult for problem creators.<br><br><\/li><li><strong><span style=\"text-decoration: underline;\">Check Filters and Forwarding Addresses<\/span><\/strong><br><br>Always keep an eye on any unwanted filters or forwarding address related in your email account. If you find something fishy, delete the forwarders, immediately change your password and you\u2019re your system and keep a watch.<\/li><\/ol>\n\n\n\n<p>If you are looking for a strong and safe email service for yourself or your company, have a look at our email plans \u2013 <a rel=\"noreferrer noopener\" aria-label=\"Business Email with 5Gb storage per id (opens in a new tab)\" href=\"https:\/\/www.reliconstech.com\/professional-custom-business-email-hosting.php\" target=\"_blank\">Business Email with 5Gb storage per id<\/a> \/ <a rel=\"noreferrer noopener\" aria-label=\"Business Email with 25Gb storage per id (opens in a new tab)\" href=\"https:\/\/www.reliconstech.com\/professional-secure-enterprise-email-hosting.php\" target=\"_blank\">Business Email with 25Gb storage per id<\/a> \/ <a href=\"https:\/\/www.reliconstech.com\/google-gsuite-emailid-accounts.php\">G-Suite with <\/a><a href=\"https:\/\/www.reliconstech.com\/google-gsuite-emailid-accounts.php\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"30Gb  (opens in a new tab)\">30Gb <\/a><a href=\"https:\/\/www.reliconstech.com\/google-gsuite-emailid-accounts.php\">storage per id<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you use emails for your personal and professional use and are worried that someone might hack into your email account or see your activity, then this article is of help for you. Wether you are a computer expert or a regular user, you need to follow some basics to keep the account secure. As [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":116,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,5],"tags":[],"class_list":["post-114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-email","category-website-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Steps to Protect your Email account from hackers - The Relicons Blog<\/title>\n<meta name=\"description\" content=\"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Steps to Protect your Email account from hackers - The Relicons Blog\" \/>\n<meta property=\"og:description\" content=\"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Relicons Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/reliconstechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-09T13:21:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-09T13:28:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"480\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Relicons Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Relicons Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\"},\"author\":{\"name\":\"Relicons Team\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#\/schema\/person\/165a1cda03c654334290716fa3d9d456\"},\"headline\":\"7 Steps to Protect your Email account from hackers\",\"datePublished\":\"2019-08-09T13:21:30+00:00\",\"dateModified\":\"2019-08-09T13:28:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png\",\"articleSection\":[\"Business Email\",\"Website Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\",\"name\":\"7 Steps to Protect your Email account from hackers - The Relicons Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png\",\"datePublished\":\"2019-08-09T13:21:30+00:00\",\"dateModified\":\"2019-08-09T13:28:28+00:00\",\"description\":\"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png\",\"contentUrl\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png\",\"width\":800,\"height\":480},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.reliconstech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Steps to Protect your Email account from hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#website\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/\",\"name\":\"The Relicons Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.reliconstech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#organization\",\"name\":\"Relicons Technologies\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/relicons_logo.png\",\"contentUrl\":\"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/relicons_logo.png\",\"width\":230,\"height\":47,\"caption\":\"Relicons Technologies\"},\"image\":{\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/reliconstechnologies\",\"https:\/\/www.instagram.com\/reliconstech\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.reliconstech.com\/blog\/#\/schema\/person\/165a1cda03c654334290716fa3d9d456\",\"name\":\"Relicons Team\",\"url\":\"https:\/\/www.reliconstech.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Steps to Protect your Email account from hackers - The Relicons Blog","description":"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"7 Steps to Protect your Email account from hackers - The Relicons Blog","og_description":"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.","og_url":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/","og_site_name":"The Relicons Blog","article_publisher":"https:\/\/www.facebook.com\/reliconstechnologies","article_published_time":"2019-08-09T13:21:30+00:00","article_modified_time":"2019-08-09T13:28:28+00:00","og_image":[{"width":800,"height":480,"url":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png","type":"image\/png"}],"author":"Relicons Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Relicons Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#article","isPartOf":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/"},"author":{"name":"Relicons Team","@id":"https:\/\/www.reliconstech.com\/blog\/#\/schema\/person\/165a1cda03c654334290716fa3d9d456"},"headline":"7 Steps to Protect your Email account from hackers","datePublished":"2019-08-09T13:21:30+00:00","dateModified":"2019-08-09T13:28:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/"},"wordCount":554,"publisher":{"@id":"https:\/\/www.reliconstech.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png","articleSection":["Business Email","Website Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/","url":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/","name":"7 Steps to Protect your Email account from hackers - The Relicons Blog","isPartOf":{"@id":"https:\/\/www.reliconstech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png","datePublished":"2019-08-09T13:21:30+00:00","dateModified":"2019-08-09T13:28:28+00:00","description":"Wether you are a computer expert or a regular user, you need to follow some basics to keep the email account secure.","breadcrumb":{"@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#primaryimage","url":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png","contentUrl":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/guide-to-email-security-800x480.png","width":800,"height":480},{"@type":"BreadcrumbList","@id":"https:\/\/www.reliconstech.com\/blog\/7-steps-to-protect-your-email-account-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.reliconstech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Steps to Protect your Email account from hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.reliconstech.com\/blog\/#website","url":"https:\/\/www.reliconstech.com\/blog\/","name":"The Relicons Blog","description":"","publisher":{"@id":"https:\/\/www.reliconstech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.reliconstech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.reliconstech.com\/blog\/#organization","name":"Relicons Technologies","url":"https:\/\/www.reliconstech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.reliconstech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/relicons_logo.png","contentUrl":"https:\/\/www.reliconstech.com\/blog\/wp-content\/uploads\/2019\/08\/relicons_logo.png","width":230,"height":47,"caption":"Relicons Technologies"},"image":{"@id":"https:\/\/www.reliconstech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/reliconstechnologies","https:\/\/www.instagram.com\/reliconstech"]},{"@type":"Person","@id":"https:\/\/www.reliconstech.com\/blog\/#\/schema\/person\/165a1cda03c654334290716fa3d9d456","name":"Relicons Team","url":"https:\/\/www.reliconstech.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/posts\/114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/comments?post=114"}],"version-history":[{"count":5,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/posts\/114\/revisions"}],"predecessor-version":[{"id":120,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/posts\/114\/revisions\/120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/media\/116"}],"wp:attachment":[{"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/media?parent=114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/categories?post=114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.reliconstech.com\/blog\/wp-json\/wp\/v2\/tags?post=114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}