Don’t stop here! Important next steps:

If you suspect that someone else has access to your account, complete the following steps:

  • Step 1: Answer the following questions for yourself: Who might have access to your account (friends, co-workers, spouse, children)? What devices (computer, phone, tablet) have you used to access the account? In what physical locations have you accessed these accounts (home, office, cybercafe, wifi network)?
  • Step 2: Do you use the same password on other accounts? If so, perform the same checks on those accounts. Create new, unique passwords for each one.
  • Step 3: Think about what you use this account for. Does it hold sensitive information? This could include your contacts, information about your location or the content of your messages. If you think this information could put your contacts at risk, inform them that your account has been compromised.
  • Step 4: Repeat the review of the connection history/account activity – at least once a week for a month – to ensure that your account does not continue to show strange activity. If it continues to show strange activity, proceed to the malware section.