Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Empowering you to understand your world
focused female employee reading information on computer in office

Compromised Emails Are One Of Your Greatest Security Threats

Nearly every online service (whether financial or not) requires an email to sign up, and more importantly — they usually can be accessed via your e-mail account if it is compromised. Your e-mail account can be compromised if a hacker figures out your password. This is why your e-mail account should have its own password, which is not used elsewhere.

After getting into your e-mail account, the hacker can go to the login page of (almost) any of the online services you provided that e-mail to and request a password reset. The password reset e-mail would be sent to your e-mail and the hacker would then be able to intercept your password reset link and then set their own password — thereby taking control of your account.

Considering how many social media websites, apps, online financial services among other things were probably signed up for with one or two e-mail accounts, accessing your e-mail means that a hacker can take everything from you and make it look like you’re distributing malware, here are just a few examples:

  • Online games (via Steam, Origin, etc).
  • Online payment services.
  • Online exchanges.
  • Social media and other accounts such as Facebook, Twitter, and YouTube.
  • Online cloud services storing your data.

A hacker could theoretically steal your money, stalk you, pretend to be you online, use your payment services to fund criminal activity, among other things.

Even if you use a different password for financial services like PayPal, you still need to consider in-app purchasing and anything that allows you to send people money or buy anything online needs both a secure password and its own email (or at least use 2FA and a strong password for the email).

The first steps I would take are to enable 2 factor authentication (not SMS-based 2FA, but something better like Google Authenticator or Yubikey) and set unique, strong passwords for each e-mail and service you use online. Or at least use a few different passwords to reduce the impact of a hack. Passwords should contain a combination of letters, numbers, and symbols. Passwords with only numerals are not secure.

Share this article
Shareable URL
Prev Post

Porsche Taycan 4S Released For £83,367

Next Post

10 Tips For iPhone Maintenance: Get The Best Performance From Your Phone

Leave a Reply

Read next
Subscribe to our newsletter
Get notified when new content is published