{"id":19818,"date":"2024-07-17T12:00:48","date_gmt":"2024-07-17T10:00:48","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=19818"},"modified":"2024-07-18T10:16:57","modified_gmt":"2024-07-18T08:16:57","slug":"hilfe-mein-e-mail-passwort-wurde-kompromittiert","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/07\/17\/hilfe-mein-e-mail-passwort-wurde-kompromittiert\/","title":{"rendered":"Help, My Email Password Was Compromised!"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_19818 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_19818')){$('.twoclick_social_bookmarks_post_19818').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2024\\\/07\\\/17\\\/hilfe-mein-e-mail-passwort-wurde-kompromittiert\\\/\",\"post_id\":19818,\"post_title_referrer_track\":\"Help%2C+My+Email+Password+Was+Compromised%21\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_19832\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-19832\" class=\"wp-image-19832 size-medium\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893-300x200.jpg\" alt=\"Laptop with spam pop-ups\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893-300x200.jpg 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893-1024x683.jpg 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893-768x512.jpg 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893-1536x1025.jpg 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/07\/18841272_5987262-1-e1721290547893.jpg 1803w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-19832\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/de.freepik.com\/vektoren-kostenlos\/farbverlaufs-popup-ui-und-ux-design_18841272.htm#fromView=search&amp;page=1&amp;position=4&amp;uuid=7087e4b8-c1e9-47d9-a033-d95f40bbc7ec\">Freepik<\/a><\/p><\/div><\/p>\n<p>In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.<\/p>\n<p>In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.<\/p>\n<p><!--more--><\/p>\n<h3><\/h3>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Do Attackers Get My Login Details?<\/p>\n<p><\/span><\/h3>\n<ol>\n<li><strong>phishing:<\/strong> fraudulent emails that trick you into revealing your login details.<\/li>\n<li><strong>malware:<\/strong> malicious software that records your keystrokes or steals information.<\/li>\n<li><strong>data leaks:<\/strong> hacked databases with user information.<\/li>\n<li><strong>social engineering:<\/strong> deception through phone calls or other means of communication.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Can I Better Secure My Accounts?<\/p>\n<p><\/span><\/h3>\n<ol>\n<li><strong>use strong passwords:<\/strong> Combine upper and lower case letters, numbers and special characters.<\/li>\n<li><strong>unique passwords:<\/strong> use a unique password for each account.<\/li>\n<li><strong>two-factor authentication (2FA):<\/strong> Add an extra <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/0f861f53818c44e9a5df6ea7b244dacd\/\">layer of security<\/a>.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Do I Choose and Manage Secure Passwords?<\/p>\n<p><\/span><\/h3>\n<ol>\n<li><strong>use a password manager:<\/strong> Create and store strong, unique passwords.<\/li>\n<li><strong>no personal information:<\/strong> Avoid personal information in your passwords.<\/li>\n<li><strong>longer passwords:<\/strong> Use passwords with at least 12 characters.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What Should I Do if My Account Has Been Compromised?<\/p>\n<p><\/span><\/h3>\n<ol>\n<li><strong>check devices for viruses:<\/strong> We recommend scanning with <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/t4ncceheru46\/\">Sophos Antivirus<\/a> and the free version of <a href=\"https:\/\/www.malwarebytes.com\/?lr&amp;_ga=2.18646269.556557608.1720788397-1045724348.1720788397&amp;_gl=1%2Adp28k9%2A_gcl_au%2AMjg3NDQxNjUwLjE3MjA3ODgzOTc.%2A_ga%2AMTA0NTcyNDM0OC4xNzIwNzg4Mzk3%2A_ga_K8KCHE3KSC%2AMTcyMDc4ODM5Ny4xLjAuMTcyMDc4ODM5OS41OC4wLjA.\">Malwarebytes<\/a><\/li>\n<li><strong>change password immediately:<\/strong> Change the password of the affected account immediately.<\/li>\n<li><strong>check security settings:<\/strong> Make sure <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/01\/03\/sicherheitsmechanismen-kurz-erklaert-mfa\/\">2FA<\/a> is enabled and no unknown devices have access.<\/li>\n<li><strong>notify contacts:<\/strong> Inform your contacts about the compromise.<\/li>\n<li><strong>check accounts for suspicious activity:<\/strong> Make sure no unauthorized changes have been made.<\/li>\n<li><strong>contact customer support:<\/strong> Seek help if you have difficulty restoring access. The <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/services\/support-moeglichkeiten\/it-servicedesk\/~sqqto\/kontakt-oeffnungszeiten\/?lidx=1\">IT ServiceDesk<\/a> will be happy to answer any questions you may have.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What Should I Be Aware of to Ensure That My Accounts Are Not Compromised?<\/p>\n<p><\/span><\/h3>\n<ol>\n<li><strong>be careful with suspicious emails:<\/strong> do not open any attachments and do not click on links in emails from unknown senders<\/li>\n<li><strong>regular software updates:<\/strong> keep your operating system and applications up to date.<\/li>\n<li><strong>use antivirus software:<\/strong> Install and update antivirus software regularly, such as <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/t4ncceheru46\/\">Sophos Antivirus<\/a>. Also available for smartphones.<\/li>\n<li><strong>be careful with public networks:<\/strong> Avoid logging into sensitive networks via public Wi-Fi networks. If you use a public network, use the <a href=\"https:\/\/help.itc.rwth-aachen.de\/en\/service\/vbf6fx0gom76\/\">RWTH VPN<\/a> with the full tunnel.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Conclusion<\/span><\/h3>\n<p>Keeping your email accounts and other online accounts secure is essential to protect your personal and professional data. Use strong passwords, enable two-factor authentication and watch out for suspicious activity to reduce the risk of compromise. If your account has been compromised, act quickly and follow the steps above to minimize the damage and restore your security.<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-86C6P65&amp;allou=1&amp;lidx=1\">Maryam Hassani<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":3675,"featured_media":19827,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[314,315],"tags":[50,1196,1198,61,1197],"class_list":["post-19818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-sicherheit","category-services-support","tag-e-mail","tag-e-mail-passwort","tag-e-mail-postfach","tag-it-sicherheit","tag-kompromitierung"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/19818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/3675"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=19818"}],"version-history":[{"count":11,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/19818\/revisions"}],"predecessor-version":[{"id":21905,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/19818\/revisions\/21905"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/19827"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=19818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=19818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=19818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}