{"id":1635,"date":"2016-10-22T14:50:36","date_gmt":"2016-10-22T03:50:36","guid":{"rendered":"https:\/\/www.wiredoffice.com.au\/articles\/?p=1635"},"modified":"2016-10-22T14:50:36","modified_gmt":"2016-10-22T03:50:36","slug":"is-your-gmail-hacked-how-to-get-access-again","status":"publish","type":"post","link":"https:\/\/www.wiredoffice.com.au\/articles\/computer-security\/is-your-gmail-hacked-how-to-get-access-again\/","title":{"rendered":"is your gmail hacked? How to get access again."},"content":{"rendered":"

<\/a><\/p>\n

emails accounts like gmail are used by small business and professionals as a quick and easy (free) email service but there’s a catch. If you get hacked there’s no one to call, you are out in the cold and left to your own resources.<\/p>\n

Hacking is mostly not really about hacking, but guessing your password. We see passwords all the time that look like this:<\/p>\n

abc1234<\/p>\n

password<\/p>\n

and so on. If you are running a business off this free email system you should be prepared for a disaster or you might never see your email again.<\/p>\n

To mitigate the risk:<\/p>\n

    \n
  1. associate a mobile phone number with your account<\/li>\n
  2. if you are trying to regain access to a lost or hacked account it seems you should be doing this from the same computer you usually log in with, otherwise flags are raised and it will be more difficult.<\/li>\n
  3. setup a secondary email address in your account, though if your account is hacked this might be changed.<\/li>\n
  4. set up strong passwords, not the name of your cat you talk about on your social profiles.<\/li>\n<\/ol>\n

    You can also setup gmail to use offline so if you do get hacked you will have access to old emails. Follow the steps in this support article.<\/p>\n

    https:\/\/support.google.com\/mail\/answer\/1306849?hl=en<\/p>\n

     <\/p>\n","protected":false},"excerpt":{"rendered":"

    emails accounts like gmail are used by small business and professionals as a quick and easy (free) email service but…
    More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[6],"tags":[],"_links":{"self":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1635"}],"collection":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/comments?post=1635"}],"version-history":[{"count":2,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1635\/revisions"}],"predecessor-version":[{"id":1638,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/posts\/1635\/revisions\/1638"}],"wp:attachment":[{"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/media?parent=1635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/categories?post=1635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wiredoffice.com.au\/articles\/wp-json\/wp\/v2\/tags?post=1635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}