fbpx
Search
Close this search box.

Symptoms of a Hacked Email Account

Stressed businessman working at an office.

“My clients received spam/phishing emails from my work email. What do I do?”

If a client has contacted you about a suspicious email sent from your account, take action immediately. It may be a warning signal that a hacker has not only gained access to your email account, but to your company’s network as well.

Your clients recognize and trust the messages they receive from you. That’s why hackers use your good name—it gets them past the usual IT defenses and straight to your clients’ data, often using phishing as their method of attack.

3 Symptoms Your Email Is Hacked & What to Do About It

While some hackers spoof email addresses (which requires no access to your actual email account), emails sent to your key contacts indicate a well-researched hack—especially when those emails include contextually accurate subject matter (e.g. You are an accountant and the hacker attached a phony invoice).

In summary, an attempt at phishing “in your name” is especially troubling because it could signify that your data has already  been accessed by a hacker. This has huge implications for your company’s health and the sooner it is addressed, the better the outcome will be for your company’s reputation, security, and profitability.

Addressing a Small Issue Now Can Prevent a Major Issue Down the Road

A hacked email can be a symptom of cyber security weaknesses, but you aren’t the first to experience it and you won’t be the last. In fact, you could be one of the first among your competitors to adopt solid security practices.

Are you concerned you may have been hacked? Talk to an Corsica Technologies security advisor. Email ITsecurity@edts.com or call 1-855-411-3387 EXT 2.

EMAIL HACKED?

3 Symptoms & What to Do About It

1. People are receiving emails you didn’t send.

Your LinkedIn and business connections are reporting emails with links and attachments that don’t seem to work—all sent from your personal email or key accounts at your place of business.

2. You are having trouble eradicating viruses from one of your computers.

The same virus keeps showing up in your scans—even after restoring your device.

3. You have seen remote login alerts but can’t find them later.

This is a sign that a hacker is in your email account (or network) and attempting to cover their tracks.

WHAT TO DO

1. Notify Your IT Department

They will likely need your device to run scans and (possibly) perform a hard reset. In the meantime, change your passwords and warn your contacts not to click links in emails they weren’t expecting from you.

2. Document Your Data

Hackers often gain access to your email by first gaining access to your device. Give your IT team a list or summary of the types of sensitive data you have access to, whether client records, passwords, company financials, etc.

3. Initiate Incident Response

IT departments should bring in an incident response team to find the source or risk missing an active intruder with a backdoor into your network, devices, and data.

4. Find the Gaps

After the infection source is taken care of, begin a security risk assessment to locate which weaknesses in your security were exploited by hackers. You may find you need phishing training for employees or security monitoring.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

Cloud Cost Optimization - 4 Strategies to Win - Corsica Technologies

Cloud Cost Optimization: 4 Strategies To Win

Cloud is all the rage in IT infrastructure—but it gets expensive. Fast. If you don’t break out of legacy thinking, you can lose your shirt on cloud systems. That’s the case whether you’re managing those systems in house or outsourcing

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.