The problem of online security is huge: our data is accessible to others, such as the companies that manage the social networks we use, but also to those who manage to sneak onto our accounts and our devices. There are many cases of hacking and phishing: but how do you know if we have been the victim of an attack? Is there any sign left by those who forced the security of our data by sneaking between our photos and our passwords? The answer is yes.
Often those who manage to access our devices leave real traces that, if we are careful enough, we can identify. The most important point of all, though, is what to do in case we discover that we have been the victim of unwanted access. Controlling the security of our accounts is essential, but deciding how to react is even more so.
filistimlyaninGetty ImagesTo be able to understand if we have been victims of cyber attacks there are many ways, the safest, however, are to check some very particular details simply by opening our apps, especially the most common ones, such as Gmail, the Google mail service. Here's how to do it: first of all open the app, then scroll down to the emails received and click on "details", another window will appear showing the last 10 logins to our account, complete with the geolocation of the access. What we have to do is simple: did we make those accesses from those areas or not? If we notice that there is a discrepancy, if for example the access has come from areas that we have never even visited, then here we are in front of a clear signal.
Also on Facebook we can verify in the same way. Just access "security" from settings and then "see more" from the login list. Even Facebook, like Gmail, provides the access list with date, time of access and geographical area from which the connection was made. If anyone has managed to log into our account, we will know.
Twitter also has a similar function, but better than all the others for efficiency: we access the settings page, click on "Apps and sessions" and see precisely which devices are connected to our account and where these devices are located. Including apps that have access to Twitter indirectly.
Instagram, which as we know is owned by Facebook, instead has a special page from which we view all the logins made recently, their location, dates and times of access.
What if we notice that someone has accessed our data? First of all, change your password immediately, then check the device with an antivirus.
This content is created and maintained by a third party, and imported onto this page to help users provide their email addresses. You may be able to find more information about this and similar content at piano.io