{"id":12168,"date":"2024-01-25T15:08:04","date_gmt":"2024-01-25T14:08:04","guid":{"rendered":"https:\/\/www.combell.com\/en\/blog\/?p=12168"},"modified":"2024-02-08T13:03:06","modified_gmt":"2024-02-08T12:03:06","slug":"e-mail-hacked","status":"publish","type":"post","link":"https:\/\/www.combell.com\/en\/blog\/e-mail-hacked\/","title":{"rendered":"&#8220;Oh no! My email address has been hacked, what should I do?&#8221;"},"content":{"rendered":"<p><strong>While reading this article and realizing that your email address has been hacked, it can be a huge downer. It's definitely not the time to make jokes. But despite the seriousness of the situation, you mustn't sit idly by. Take matters into your own hands and discover step by step what you need to do to get your email address up and running again after a hack.<\/strong><\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-table-of-contents uagb-toc__align-left uagb-toc__columns-1  uagb-block-ea16d57a     \"\n\t\t\t\t\tdata-scroll= \"1\"\n\t\t\t\t\tdata-offset= \"30\"\n\t\t\t\t\tstyle=\"\"\n\t\t\t\t><\/p>\n<div class=\"uagb-toc__wrap\">\n<div class=\"uagb-toc__title\">\n\t\t\t\t\t\t\t<strong>Table of contents<\/strong>\t\t\t\t\t\t\t\t\t\t\t\t\t<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox= \"0 0 384 512\"><path d=\"M192 384c-8.188 0-16.38-3.125-22.62-9.375l-160-160c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L192 306.8l137.4-137.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-160 160C208.4 380.9 200.2 384 192 384z\"><\/path><\/svg>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<div class=\"uagb-toc__list-wrap\">\n<ol class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#email-security-is-very-important\">Email security is very important<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#even-more-crucial-for-businesses\">Even more crucial for businesses<\/a><\/li>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"uagb-toc__list\"><a href=\"#your-mailbox-hacked-heres-how-to-find-out\">Your mailbox hacked? Here&#039;s how to find out<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#email-hacked-what-to-do-next\">Email hacked: what to do next<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#securing-your-email-account-better\">Securing your email account better<\/a><\/li>\n<ul class=\"uagb-toc__list\">\n<li class=\"uagb-toc__list\"><a href=\"#combell-mailboxes\">Combell mailboxes<\/a><\/li>\n<li class=\"uagb-toc__list\"><a href=\"#ssl-for-email\">SSL for email<\/a><\/li>\n<\/ul>\n<\/ul>\n<\/ol><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Email security is very important<\/h2>\n<p>You probably shudder at the thought of someone breaking into your mailbox and snooping through your correspondence. Or worse yet: using <strong>the information to steal<\/strong> from you. For your email address and your mailbox, it's just the same. Because together, they form your <strong>online mailbox<\/strong>. Someone with malicious intent shouldn't have access to it.<\/p>\n<p>That's why we want to emphasize the importance of good email security. If your account is hacked, <strong>your privacy is at risk and a lot of personal data is up for grabs. <\/strong>Just think of communication with your bank, login details for various accounts (social media)...<\/p>\n<p>By ensuring good email security, you're also better protected against <a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-a-phishing-e-mail-and-how-can-you-tell-it-is-a-fake-e-mail\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing emails<\/a> and malware.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-consequences-1024x731.png\" alt=\"When your email account is hacked, it can have serious consequences.\" class=\"wp-image-12220\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-consequences-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-consequences-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-consequences-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-consequences.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">When your email account is hacked, it can have serious consequences.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Even more crucial for businesses<\/h3>\n<p>If it's already very important for 'ordinary mortals' to secure their emails properly, then it's even more crucial for businesses! Personal data, financial information, confidential data, important business documents... There's a good chance that within an organization, emails are being exchanged containing this type of information.<\/p>\n<p>If your company's email security is weak, you're much more likely to fall victim to hacking or phishing attacks. <strong>It would be a huge disaster if your company's data fell into the wrong hands.<\/strong><\/p>\n<p>Not to mention the problems you'll face afterwards. Think of<strong> loss of income<\/strong>, data you've lost, <strong>damage to your reputation<\/strong>, employees and customers who are suspicious about the security of your business... It's clear: you'd better invest heavily in securing your email addresses and mailboxes.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-4dabda4c uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p>Preventing disasters? Get yourself a <a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-business-continuity\/\" target=\"_blank\" rel=\"noreferrer noopener\">Business Continuity Plan<\/a>.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Your mailbox hacked? Here's how to find out<\/h2>\n<p>We would be lying if we claimed that your mailbox will never ever be hacked. Hopefully, you won't experience it.<\/p>\n<p>If you suspect that you're a victim of email hacking, <strong>first check the following points.<\/strong> Are you experiencing what we describe here? Unfortunately, there's a good chance your mail has been hacked.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-f183a92d\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-7a0c390e\"><a target=\"_self\" aria-label=\"Do you notice unusual activity?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256s114.6 256 256 256s256-114.6 256-256S397.4 0 256 0zM256 400c-18 0-32-14-32-32s13.1-32 32-32c17.1 0 32 14 32 32S273.1 400 256 400zM325.1 258L280 286V288c0 13-11 24-24 24S232 301 232 288V272c0-8 4-16 12-21l57-34C308 213 312 206 312 198C312 186 301.1 176 289.1 176h-51.1C225.1 176 216 186 216 198c0 13-11 24-24 24s-24-11-24-24C168 159 199 128 237.1 128h51.1C329 128 360 159 360 198C360 222 347 245 325.1 258z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Do you notice unusual activity?<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>Are you receiving notifications of suspicious login attempts (such as from unknown IP addresses), or do you notice issues with sent or received emails? Then you're likely being targeted by hackers.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-105ffda9 uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Tip<\/p>\n<div class=\"uagb-notice-text\">\n<p>With a tool like '<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Have I Been Pwned<\/a>', you can enter your email address and see if your email has appeared in known data breaches. If your email address is in their database, it means your account may have been compromised.<\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-a6a3156d\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-880d6b68\"><a target=\"_self\" aria-label=\"Have your email settings been tampered with?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256s114.6 256 256 256s256-114.6 256-256S397.4 0 256 0zM256 400c-18 0-32-14-32-32s13.1-32 32-32c17.1 0 32 14 32 32S273.1 400 256 400zM325.1 258L280 286V288c0 13-11 24-24 24S232 301 232 288V272c0-8 4-16 12-21l57-34C308 213 312 206 312 198C312 186 301.1 176 289.1 176h-51.1C225.1 176 216 186 216 198c0 13-11 24-24 24s-24-11-24-24C168 159 199 128 237.1 128h51.1C329 128 360 159 360 198C360 222 347 245 325.1 258z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Have your email settings been tampered with?<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>Check if unauthorized changes have been made to your mailbox settings. Can't access it anymore? Unable to log in because your password suddenly became invalid? These are clear signs of a hacked email address.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ip-1024x731.png\" alt=\"Login attempts from other IP addresses can be a warning sign.\" class=\"wp-image-12222\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ip-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ip-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ip-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ip.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Login attempts from other IP addresses can be a warning sign.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-f1e56959\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-3079dd97\"><a target=\"_self\" aria-label=\"Are you (or your employees) suddenly sending spam messages?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256s114.6 256 256 256s256-114.6 256-256S397.4 0 256 0zM256 400c-18 0-32-14-32-32s13.1-32 32-32c17.1 0 32 14 32 32S273.1 400 256 400zM325.1 258L280 286V288c0 13-11 24-24 24S232 301 232 288V272c0-8 4-16 12-21l57-34C308 213 312 206 312 198C312 186 301.1 176 289.1 176h-51.1C225.1 176 216 186 216 198c0 13-11 24-24 24s-24-11-24-24C168 159 199 128 237.1 128h51.1C329 128 360 159 360 198C360 222 347 245 325.1 258z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Are you (or your employees) suddenly sending spam messages?<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>If your contacts, whether they're your parents or your clients, inform you that they've received suspicious emails from you, you'd better pay attention. It's possible that hackers are using your email account to send phishing emails. That's a clear example of the far-reaching consequences of email hacking.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-5bfe4f69\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-3bb48987\"><a target=\"_self\" aria-label=\"Are strange apps, software, or plug-ins appearing?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256s114.6 256 256 256s256-114.6 256-256S397.4 0 256 0zM256 400c-18 0-32-14-32-32s13.1-32 32-32c17.1 0 32 14 32 32S273.1 400 256 400zM325.1 258L280 286V288c0 13-11 24-24 24S232 301 232 288V272c0-8 4-16 12-21l57-34C308 213 312 206 312 198C312 186 301.1 176 289.1 176h-51.1C225.1 176 216 186 216 198c0 13-11 24-24 24s-24-11-24-24C168 159 199 128 237.1 128h51.1C329 128 360 159 360 198C360 222 347 245 325.1 258z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Are strange apps, software, or plug-ins appearing?<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>Check if there are any apps or programs that have access to your mailbox. Remove unknown or suspicious apps that you haven't given permission to.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-54419382\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f1507d68\"><a target=\"_self\" aria-label=\"Are you receiving warnings from your email provider?\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256s114.6 256 256 256s256-114.6 256-256S397.4 0 256 0zM256 400c-18 0-32-14-32-32s13.1-32 32-32c17.1 0 32 14 32 32S273.1 400 256 400zM325.1 258L280 286V288c0 13-11 24-24 24S232 301 232 288V272c0-8 4-16 12-21l57-34C308 213 312 206 312 198C312 186 301.1 176 289.1 176h-51.1C225.1 176 216 186 216 198c0 13-11 24-24 24s-24-11-24-24C168 159 199 128 237.1 128h51.1C329 128 360 159 360 198C360 222 347 245 325.1 258z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Are you receiving warnings from your email provider?<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>In some cases, providers send you notifications if they detect suspicious activities. Don't just ignore these notifications or warnings.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-checklist-1024x731.png\" alt=\"In this blog article, you can read about what to do if your email has been hacked.\" class=\"wp-image-12219\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-checklist-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-checklist-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-checklist-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-checklist.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">In this blog article, you can read about what to do if your email has been hacked.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Email hacked: what to do next<\/h2>\n<p>If your email address has been hacked, you shouldn't just sit back and do nothing. It's definitely not fun, but it's <strong>very important to regain control <\/strong>and minimize the damage as much as possible. Here are the steps you should take:<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-0cff6541 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-532f41fd uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Don't panic\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Don't panic<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>Easier said than done. We completely understand that. However, it's extremely important to remain calm and do the right thing. After all, the damage has already been done. There's nothing you can do to change that.<\/p>\n<p>Make do with what you have. This way, you can try to minimize the consequences of email hacking.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-0d1446fc uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-ce7a47ab uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Change your passwords (if possible)\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Change your passwords (if possible)<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>If you still have access to your hacked email account, immediately change your password. Choose a strong, new password, including uppercase letters, numbers, and special characters. If you use certain passwords, including your email address, on other accounts, you should also reset those.<\/p>\n<p>You can store different passwords in a <a href=\"https:\/\/safeonweb.be\/en\/use-different-passwords-and-store-them-password-manager\" rel=\"noreferrer noopener\" target=\"_blank\">password manager<\/a>. This also makes it more convenient to change your passwords regularly.<\/p>\n<p>If you're too late and can't log in anymore, click on \"Forgot password\" and try to regain access through your provider's pre-set security questions. You can sometimes also use a secondary email address (if you set it up beforehand) or your registered phone number.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-46fa04fa uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-86805b3b uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Consider Two-Factor Authentication\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Consider Two-Factor Authentication<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p><strong>Two-Factor Authentication (2FA)<\/strong> is an extra layer of security on top of your password. With 2FA, you need to verify your identity in more than one way. For example, the combination of your password and an SMS code. You can read more about this login method on <a href=\"https:\/\/safeonweb.be\/en\/use-two-factor-authentication\" target=\"_blank\" rel=\"noreferrer noopener\">Safeonweb<\/a>.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-9bf1ead4 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-c776d48f uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Find out how your mailbox was hacked\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Find out how your mailbox was hacked<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>For tips on this, you can contact our free support service, but you can also start investigating on your own right away. There are <a href=\"https:\/\/www.f-secure.com\/gb-en\/online-scanner\" rel=\"noreferrer noopener\" target=\"_blank\">online tools<\/a> available that allow you to perform a security scan. For example, you can find out if malware is installed. It's important to find out how the hack occurred.<\/p>\n<p>If you never figure it out, there's a chance that hackers will target you again or simply continue to monitor everything.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1024x731.png\" alt=\"How did a hacker gain access to your mailbox?\" class=\"wp-image-12221\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-1024x731.png 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-300x214.png 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker-768x549.png 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-hacker.png 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">How did a hacker gain access to your mailbox?<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-icon-list uagb-block-ca785017 uagb-icon-list__outer-wrap uagb-icon-list__layout-vertical uagb-icon-list__icon-at-top\">\n<div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-f352eb6d uagb-icon-list-repeater uagb-icon-list__wrapper\"><a target=\"_self\" aria-label=\"Assess the impact\" rel=\"noopener noreferrer\" href=\"#\"> <\/a><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Assess the impact<\/strong><\/strong><\/span><\/div>\n<\/div>\n<\/div>\n<p>How severe is the damage? What problems do you still need to solve? By assessing the impact of the hack, you get a better understanding of the situation. This includes identifying spam messages and fake emails, checking for any purchases made from your account, contacting your bank...<\/p>\n<p>Moreover, the evidence you gather can be shared with the <strong>police<\/strong>. Is that excessive? Not at all. Report it to the authorities as soon as possible.<\/p>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"wp-block-heading\">Securing your email account better<\/h2>\n<p>If your email accounts have been hacked, you naturally want to prevent that from happening again in the future. <strong>Strong password management, 2FA (Two-Factor Authentication), security checks<\/strong>... these are all ways to enhance the security of your email account.<\/p>\n<p>For those who want to take it a step further, opting for highly secure mailboxes and <a href=\"https:\/\/www.combell.com\/en\/ssl-certificates\" target=\"_blank\" rel=\"noreferrer noopener\">SSL<\/a> encryption is a wise choice! \ud83d\ude09<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">Combell mailboxes<\/h3>\n<p>Combell is an ultra-secure provider! We have an <a href=\"https:\/\/www.combell.com\/en\/blog\/iso-27701-certified-for-being-gdpr-compliant\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001 certification<\/a> for a reason. Such a <a href=\"https:\/\/www.combell.com\/en\/about-combell\/iso-certificate-hosting\">certificate<\/a> is your guarantee of safety. In other words, your data is safe with Combell.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-uagb-inline-notice uagb-inline_notice__align-left uagb-block-eb0c0b2f uagb-inline_notice__outer-wrap\">\n<p class=\"uagb-notice-title\">Also read<\/p>\n<div class=\"uagb-notice-text\">\n<p><a href=\"https:\/\/www.combell.com\/en\/blog\/why-a-professional-e-mail-address-matters\/\" target=\"_blank\" rel=\"noreferrer noopener\">Why having a professional email address is important<\/a><\/p>\n<\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<p>If you want to email professionally, then you're much better off with a professional email address. Those free email addresses can come across as - well - amateurish. Plus, your mailbox is in the <strong>safe hands of Combell.<\/strong><\/p>\n<p>Even if something goes wrong or you notice something... Our rock-solid <a href=\"https:\/\/www.combell.com\/en\/support\" target=\"_blank\" rel=\"noreferrer noopener\">support team<\/a> is always ready to assist you. Day and night, and moreover, completely free of charge.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-yellow-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/en\/email-hosting\">Your mailbox in safe hands<\/a><\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"366\" src=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ssl-1024x366.jpg\" alt=\"No stolen email addresses with SSL on your email communication.\" class=\"wp-image-12228\" srcset=\"https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ssl-1024x366.jpg 1024w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ssl-300x107.jpg 300w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ssl-768x274.jpg 768w, https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-ssl.jpg 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">No stolen email addresses with SSL on your email communication.<\/figcaption><\/figure>\n<\/div>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h3 class=\"wp-block-heading\">SSL for email<\/h3>\n<p>You're probably already familiar with an SSL certificate that provides your website with an encrypted connection. Well, SSL can also be used for your email boxes. This way, you ensure that cybercriminals can't intercept your emails.<\/p>\n<p>Need help setting up your mailbox with a secure <a href=\"https:\/\/www.combell.com\/en\/blog\/what-is-ssl\/\" rel=\"noreferrer noopener\" target=\"_blank\">SSL connection<\/a>? Use our guide on <a href=\"https:\/\/www.combell.com\/en\/help\/kb\/what-does-ssl-mean-in-the-context-of-mail\/\" rel=\"noreferrer noopener\" target=\"_blank\">SSL for email<\/a> or let our <a href=\"https:\/\/www.combell.com\/en\/support\" rel=\"noreferrer noopener\" target=\"_blank\">support colleagues<\/a> assist you.<\/p>\n<p>Additionally, you can always rely on our email experts. They'll advise you on the best security measures for your email address and mailbox.<\/p>\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-buttons is-vertical is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-fill\"><a class=\"wp-block-button__link has-white-color has-yellow-background-color has-text-color has-background wp-element-button\" href=\"https:\/\/www.combell.com\/en\/help\/kb\/what-does-ssl-mean-in-the-context-of-mail\/\">Securing your mailbox with SSL<\/a><\/div>\n<\/div>\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Find out what to do if your email address has been hacked. Learn about the crucial role of email security. Learn how to detect if your email account has been hacked and discover steps to regain control.<\/p>\n","protected":false},"author":33,"featured_media":12227,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","footnotes":""},"categories":[62],"tags":[292,41],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small.jpg",1200,420,false],"thumbnail":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-50x50.jpg",50,50,true],"medium":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-300x105.jpg",300,105,true],"medium_large":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-768x269.jpg",768,269,true],"large":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-1024x358.jpg",1024,358,true],"1536x1536":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small.jpg",1200,420,false],"2048x2048":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small.jpg",1200,420,false],"post-featured":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-850x290.jpg",850,290,true],"post-featured-opt":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-750x256.jpg",750,256,true],"post-featured-opt-md":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-850x290.jpg",850,290,true],"post-featured-opt-sm":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-485x165.jpg",485,165,true],"post-featured-opt-xs":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-375x128.jpg",375,128,true],"post-most-popular":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-50x50.jpg",50,50,true],"post-author":["https:\/\/www.combell.com\/en\/blog\/files\/email-hacking-small-60x60.jpg",60,60,true]},"uagb_author_info":{"display_name":"Amber","author_link":"https:\/\/www.combell.com\/en\/blog\/author\/amber\/"},"uagb_comment_info":0,"uagb_excerpt":"Find out what to do if your email address has been hacked. Learn about the crucial role of email security. Learn how to detect if your email account has been hacked and discover steps to regain control.","_links":{"self":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12168"}],"collection":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12168"}],"version-history":[{"count":14,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12168\/revisions"}],"predecessor-version":[{"id":12244,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12168\/revisions\/12244"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media\/12227"}],"wp:attachment":[{"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.combell.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}