S70: Unauthorized Access
04-MAY- 2024 | The Purge (Ep 7)
This is Sirflex speaking, Your Host! GM everybody, i officially welcome you today's space.
The Purge (EP 7)
Let's do something quick, tag a comrade in the comment section, use the #bwbseries and wish them happy weekend.
In today's series, I have one poll & one question for you.
Unauthorised Access
Imagine you worked hard for the past 30 days, you get paid your salary, or imagine you are doing a business, you made high value sales. or you converted an HNI (High Net-worth Individual), or you are even a student, and you have been asking your uncle, aunt, mom, dad for pocket money. then all of a sudden they all send to urgent 2k the same day.
then one day, all of a sudden, you got an alert, and all the money you have in the account is gone.
all the joy you feel when you have money can be chartered if you allow unauthorised access to your account?
the truth is no one person want to give someone else unauthorised access, the big question is how do they then gain access to your account?
!! How do you give unauthorised access to scammers?
Remember the rules
Engage the polls, engage the comment section, and show reactions so we can all have a wonderful experience today.
Today's series is sponsored by ADEWALEFLEX,
At the end of today's series, we must have been able to
Know how people gain unauthorised access
How you identify them
What you can do to save yourself
Welcome to Breakfast w/ Blockchain
Welcome to Breakfast with Blockchain, Here, we talk about Web3, Innovation, our environment and recent development. this Saturday and every other Saturday at 10 a.m, we gather here to chat. Join our WhatsApp for discussion and Connect with us on twitter in our twitter community. and let's grow together.
Let's get started!" 💡🚀 #BreakfastWithBlockchain
Let's get started
How do people gain unauthorised access to your account
You will want to know about unauthorised access. SIRFITECH, x take over, instagram take over GTBank account intercepted. what is common, urgency.
How can you identify when an unauthorised access is made
depending on the channel:
remain calm, don't rush to respond
login to your said account, change the password immediately, and setup 2FA
Go back to sleep
How you can identify unauthorised access
Unexpected Activity Alerts: Many services send notifications for unusual activity, such as logins from new devices or locations. Pay attention to these alerts.
Review Login History: Most accounts (like email, social media, and banking accounts) allow you to view your recent login activity. Look for any logins from unfamiliar locations or devices.
Unfamiliar Charges or Transactions: Check your bank statements and account summaries regularly for any transactions you don’t recognize.
Password Issues: If you find that your password is not working and you didn’t change it, it could be a sign that someone else has accessed your account and changed the password.
Unsolicited Password Reset Emails: If you receive emails about password resets that you did not initiate, it may be a sign that someone else is trying to access your account.
Changes in Account Settings: Unauthorized changes to your account settings (like linked email addresses or phone numbers) can be a red flag.
Unexpected Emails or Messages: Receiving confirmation emails for accounts you didn’t set up or messages thanking you for subscriptions you didn’t buy can indicate misuse of your information.
Security Software Alerts: If your antivirus or anti-malware software triggers an alert about a potential threat, it could be related to unauthorized attempts to access your devices or accounts.
What can you do when you are exposed to unauthorised access
Change Your Password: Immediately change the password for the affected account. If you're unable to log in, use the account recovery options provided by the service.
Check Account Details: Review all account details and settings for any changes made by the unauthorized party, such as the email address, phone number, and security questions.
Update Security Settings: Enable or strengthen security settings like two-factor authentication if you haven’t already.
Notify the Service Provider: Contact the company or service provider for the affected account. They can help secure your account and track any unauthorized activity.
Check for Breaches on Other Accounts: If you use the same or similar passwords on other accounts, change those immediately.
Monitor Your Accounts: Keep an eye on your account statements and logs for any unusual activity that may occur after the breach.
Report Identity Theft (if applicable): If there is evidence that your personal information is being misused, report it to the relevant authorities and consider measures to protect your identity, such as credit freezes.
Use Security Software: Run a security scan on your devices to check for malware or viruses that might be capturing your information.
What can you do to be safe
Use Strong Passwords: Ensure your passwords are complex, long (at least 12 characters), and unique. Include a mix of upper and lower case letters, numbers, and special characters.
Enable Two-Factor Authentication (2FA): Always enable 2FA where possible. This adds an extra layer of security by requiring a second form of identification beyond just your password.
Update Regularly: Keep your software, apps, and devices updated. Updates often include security patches that protect against new vulnerabilities.
Use Secure Networks: Avoid using public Wi-Fi for accessing sensitive accounts. If you need to use public Wi-Fi, consider using a virtual private network (VPN) to secure your connection.
Be Wary of Phishing Attempts: Be cautious with emails or messages requesting your account details. Always verify the authenticity of any request for sensitive information.
Limit Sharing of Sensitive Information: Be mindful of the personal information you share online and whom you share it with.
Use Security Software: Install and maintain security software, such as antivirus and anti-malware programs, to help detect and prevent malicious attacks.
Monitor Account Activity: Regularly check your account activity for any unauthorized access or suspicious behavior. Many services offer alert features that notify you of unusual activity.
Comrade of the week
Regularly review account activities for unusual signs and employ security software to detect threats. These proactive steps significantly enhance your data security, keeping your digital life protected.
Conclusion
You have a digital life financially and value wise, always review your account activities for unusual signs and employ security software to detect threats. The power anyone have over you is the ability of you to accept them, don't be coerced or cajoled or scared to stay in control of what you can control. always question everything.
If you don’t believe me or don’t get it, I do not have the time to try to convince you, sorry! -Satoshi Nakamoto (July 2010) Price of bitcoin: $0.08
Last updated