Hackers and scammers often target people's email accounts to gain access to sensitive information, and their tactics can be pretty convincing. But never fear: this wikiHow will teach you how to keep your email account safe from hackers. Having a secure password is just the beginning—you'll also need to watch out for scam emails with redirected login links, fake technical support representatives, attachments, and software that installs malware, and people looking to steal your identity. Keep reading to learn more, with expert tips from cyber safety specialist Sgt. Scott Nelson, JD, and tech specialist Gonzalo Martinez.
Keep Your Email Safe From Online Hackers
Use a strong password that combines letters and numbers, and enable two-factor authentication (2FA). Only open attachments that you know are safe, and never click links from someone you don't know. Also, always ensure that your computer and antivirus software are up to date.
Steps
Protecting Your Email Account From Hackers & Scams
-
Create a strong password for your email account. A strong password should be hard for other people to guess, difficult for software to crack, but easy for you to remember. It can be tough to come up with a password that meets all of your email service's criteria and is easy to remember, but here are a few tips: [1] X Research source
- Make it long. The golden rule is that a password should be at least 12 characters long and contain a mix of uppercase and lowercase letters, numbers, and symbols.
- Choose random words. The more you use common phrases, dates, and quotes, the easier your password will be for hacking programs to guess.
- Don’t use personal information. Avoid putting your birthday, house number, or name in the password (even a middle name).
- Password-protect your phone or tablet. Even if it takes a little longer to access your home screen, always password-protect your mobile devices. If someone else gains access to your unlocked phone or tablet, they'll have access to all of your apps, including your email.
-
Use a unique password rather than reusing it. Although it’s tempting to recycle passwords, don’t use your email password for multiple accounts. If you use the same password to log in to your favorite website as you do your email, you're putting your email at risk, because if someone cracks your password on that site, they'll also have your email password.
- Since there are so many passwords to remember nowadays, try using a password manager .
- Avoid choosing the option to save your passwords on the web. If you save your password to make it easier to log in, anyone using your computer can access your email. This is especially important when using a public computer.
Advertisement -
Enable two-step verification for your account. Most popular email services, such as Gmail and Outlook , allow you to enable two-step verification, which adds a second layer of protection to your account. With two-step verification enabled, you'll have to enter a special security code that is sent to you via SMS or an authentication app when logging in from an unknown source (a computer in a different area than you usually log in from). [2] X Research source
- This secures your email, making it so that if someone manages to crack your email password, they'd also need access to your phone to sign in.
EXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.Enable two-factor authentication on all your digital accounts. That applies to all your personal accounts, business accounts, finances, client information, and productivity apps. Two-factor authentication protects your sensitive data from unauthorized parties and reduces the risk of security breaches. [3] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
-
Ensure your computer is up to date and protected. To stay safe, ensure your antivirus and antimalware software are up to date and that you’re running the latest version of your operating system and email application. Out-of-date security suites often lack the necessary coding to deal with newer viruses. When installing antivirus software, Nelson also has a few safety tips:
- “You need to be the one initiating that download or purchase of the software,” Nelson says. “So if you see something pop up on your screen that says, ‘Warning, you need to download and install this software,’ I would not recommend that.” [4]
X
Expert Source
Scott Nelson, JD
Cyber Safety Specialist Expert Interview - “If you go to Costco or a Target or something, you can actually buy a CD or thumb drive directly from them that you can install on your computer,” adds Nelson. [5]
X
Expert Source
Scott Nelson, JD
Cyber Safety Specialist Expert Interview - In other words, ensure your software comes from a trustworthy and thoroughly verified source! Research all apps and programs before installing them.
- “You need to be the one initiating that download or purchase of the software,” Nelson says. “So if you see something pop up on your screen that says, ‘Warning, you need to download and install this software,’ I would not recommend that.” [4]
X
Expert Source
Scott Nelson, JD
-
Avoid opening attachments unless you know what’s in them. Unless you know exactly who the sender is and what the attachment is for, resist the urge to click anything in the email. [6] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source Attachments can install malware on your computer, making it easy for hackers to access your email and other personal information.
-
Don't click any login links or buttons in an email message. Scam emails may also include fake login links or buttons that redirect you to a different website that captures your password. These emails are often very convincing and look like they come from a legitimate company or service you do business with. Even clicking the link can take you to a site that resembles one you use often. [7] X Trustworthy Source Federal Trade Commission Website with up-to-date information for consumers from the Federal Trade Commisson Go to source
- If an email asks you to log in to update information or correct a billing error, open a web browser window, go to the website's address directly, and log in that way to see if anything needs to be changed.
-
Do not share personal information unless you know the sender. Scammers may use email to target victims—they often send emails requesting personal information that can be used to forge your identity, such as your Social Security number or banking information. Never provide any personal information via email unless you know exactly who is requesting the information.
- If you're using Gmail or Outlook, you'll see a red or yellow message at the top of the email, warning you that the email might be spam or a phishing scam. [8] X Trustworthy Source Microsoft Support Technical support and product information from Microsoft. Go to source
- Check the return email address. Is the person claiming to represent a certain company but using a free email account?
- Does the message contain an offer that's too good to be true, or a claim that you've won a contest you never actually entered? Are you being asked to wire money to someone you don't know? These are all signs of scams.
- When in doubt, if a scammer claims to be affiliated with a company, contact the company or service directly by phone or on their website. If a phone number is included in the email, don't call it—instead, visit the company's official website and locate the phone number there. Sometimes scammers include fake contact information.
EXPERT TIPTechnology SpecialistBrandon Phipps is a Technology Specialist based in Bakersfield, CA. He is the owner of Second Star Technologies and specializes in Managed IT Services for small and mid-sized businesses in Bakersfield, CA. With over 23 years of experience, he offers expert cloud computing, cybersecurity, and network management solutions. Brandon is a committed community member and coach who leads and innovates in tech and sports coaching. His dedication to local businesses and communities is evident in his hands-on, tailored approach to IT solutions.Be careful when clicking on links or sharing your personal information online to avoid security breaches. Cybercriminals send emails with malicious links to deceive users. Verify the sender's identity and take precautions before clicking on any links or sharing personal information to prevent unauthorized account access.
-
Never share your email password with anyone. If anyone ever asks you for your password—even if they claim to work for your email service's support team—do not give them your password. There is never a need for a technical support representative to ask you for your password over the phone or via email. Your password is meant to be private.
-
Make your email security question answers difficult to guess. If your email provider allows you to set up security questions (for use in the event that you lose your password), don't enter answers that someone else can figure out, such as your mother's maiden name or your first pet's name. Choose questions and answers that nobody else would know but you!
- If the questions provided are pretty simple, you may want to enter something that isn't the actual answer to the question, such as "Flamingo" as your mother's maiden name. Just make sure not to forget what you enter!
-
10Avoid logging into your email in public. It’s even easier for hackers to access private information if you’re using public Wi-Fi (or a public computer). So, try not to log into your email with public Wi-Fi, unless you have a VPN (Virtual Private Network) to encrypt your data. Furthermore, public computers have a higher risk of containing spyware, so avoid using them to access your email or any sensitive information.
Protecting Yourself From Phishing & AI Scams
-
1Learn to recognize the signs of an AI-created scam. With AI, scammers can create convincing photos, videos, email messages, and even fake audio clips of people’s voices. “What you want to pay attention to is the distinct differences in the header of the email,” says Nelson. “For example, if you get an email from Amazon.com , that’s normal. But some of this spam could come from what looks like Amazon, but it’s spelled A M A S O N.” [9] X Expert Source Scott Nelson, JD
Cyber Safety Specialist Expert Interview- Nelson also recommends checking the email address’s domain name (the part that comes after the @ sign) to ensure it’s coming from a verified company domain. [10]
X
Expert Source
Scott Nelson, JD
Cyber Safety Specialist Expert Interview - If the email is a scam, the email address and domain will be something completely different than the business’s actual name. [11]
X
Expert Source
Scott Nelson, JD
Cyber Safety Specialist Expert Interview - For example, you could get an email from @neft1x.com instead of the actual site, @netflix.com.
- Nelson also recommends checking the email address’s domain name (the part that comes after the @ sign) to ensure it’s coming from a verified company domain. [10]
X
Expert Source
Scott Nelson, JD
-
2Verify that the person contacting you is who they claim to be. If you get a suspicious message from someone, use a verified email address or phone number (not the one used to contact you) to get in touch with that person and confirm whether or not they actually emailed you. You can also do this with companies; if a company emails you about an issue, visit their actual website and use the contact information there to ensure the issue is real. [12] X Research source
- In short, never accept an email as truth without verifying it first!
-
3Use code words to confirm loved ones’ identities. Say you get a scam email (or text) that looks like it’s from a family member—how do you know it’s a scam? Well, if you and your family discuss code words beforehand, you can pick a secret word that means it’s really them, and when the person trying to scam you doesn’t use it, you’ll be able to see through the ruse. [13] X Research source
-
4Take your time, even if the message is urgent. Scammers often make their emails sound urgent, as though something bad will happen if you don’t respond immediately with the information they want. However, don’t give in to the urgency! If an email appears to be spam, take the time to verify it, regardless of how urgent it seems. You don’t need to rush into anything, and it’s better to be cautious. [14] X Research source
-
5Report scams targeting you or your loved ones. “Contact your local law enforcement agencies,” Nelson urges. “They're going to have the best up-to-date information about whether or not this can be a federal crime or a state crime. They can take the report themselves, or they can provide you with either a state or federal agency to contact.” [15] X Expert Source Scott Nelson, JD
Cyber Safety Specialist Expert Interview Furthermore, when you report targeted scams, you can also get help in protecting yourself from them.
How Do I Keep My Data Secure In The Cloud?
Expert Q&A
-
QuestionHow can I tell if an email is legit?Yaffet Meshesha is a Computer Specialist and the Founder of Techy, a full-service computer pickup, repair, and delivery service. With over eight years of experience, Yaffet specializes in computer repairs and technical support. Techy has been featured on TechCrunch and Time.You can typically get a read on this just by reading the domain where the email came from. So, if you get an email from "James at Amaz0n," you're not actually getting an email from anyone at Amazon. Some of this boils down to common sense, but scanning the email address is always a key step.
-
QuestionHow common is it for your email to be hacked?Yaffet Meshesha is a Computer Specialist and the Founder of Techy, a full-service computer pickup, repair, and delivery service. With over eight years of experience, Yaffet specializes in computer repairs and technical support. Techy has been featured on TechCrunch and Time.It's actually extremely uncommon. People tend to think that this kind of thing happens all the time, but it's actually pretty rare. These days, the main way you're going to get in trouble with emails is if you open a phishing scam.
-
QuestionWhat's the best antivirus for Windows?Yaffet Meshesha is a Computer Specialist and the Founder of Techy, a full-service computer pickup, repair, and delivery service. With over eight years of experience, Yaffet specializes in computer repairs and technical support. Techy has been featured on TechCrunch and Time.Windows actually has a built-in anti-virus program called Windows Defender. I know it feels like you're getting extra protection when you pay for an antivirus program, but those paid programs are actually not all that better than the built-in version on your PC.
Video
Tips
- If you have to type your password multiple times due to page reloading or internet issues, do not copy and paste your password. Always type it. If you have it copied, you should copy a random word after that, so when you leave the computer, another person can't paste it onto a page.Thanks
- When creating a password, try choosing a word you can remember, but breaking up the letters with numbers and symbols. For example, w9i0k2i1h0oW! blends "wikiHow" with "90210" and adds an exclamation point to the end for good measure. This can be a helpful way to remember complicated passwords.Thanks
References
- ↑ https://edu.gcfglobal.org/en/internetsafety/creating-strong-passwords/1/
- ↑ https://support.google.com/answer/2451907?hl=en
- ↑ https://consumer.ftc.gov/articles/use-two-factor-authentication-protect-your-accounts
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
- ↑ https://consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
- ↑ https://support.microsoft.com/en-us/office/help-protect-your-outlook-com-email-account-a4f20fc5-4307-4ece-8231-6d4d4bd8a9ba
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ https://it.wisc.edu/news/ai-powered-scams-how-to-protect-yourself-2024/
- ↑ https://it.wisc.edu/news/ai-powered-scams-how-to-protect-yourself-2024/
- ↑ https://it.wisc.edu/news/ai-powered-scams-how-to-protect-yourself-2024/
- ↑ Scott Nelson, JD. Cyber Safety Specialist. Expert Interview
- ↑ https://it.wisc.edu/news/ai-powered-scams-how-to-protect-yourself-2024/
- ↑ https://it.wisc.edu/news/ai-powered-scams-how-to-protect-yourself-2024/
About This Article
1. Make sure your computer is up-to-date and protected.
2. Use a VPN (if you're using a public computer).
3. Create a strong password.
4. Use a unique password for your email account.
5. Turn on two-step verification.
6. Avoid opening attachments unless you already know what it is.
7. Don't click any login links or buttons in an email message.
8. Learn to identify phishing scams.
9. Do not share your password with anyone.
10. Make your security question answers difficult to guess.
Reader Success Stories
- "My Yahoo email has been hacked numerous times, I don't know how. I change my PW constantly but your PW tips here are fantastic. Thank you." ..." more