facebook linkedin twitter

Computerware Blog

Start Off 2020 by Auditing Your Online Accounts and Passwords

Start Off 2020 by Auditing Your Online Accounts and Passwords

Let’s take a look at a real-world scenario that I ran into a few weeks ago with a family friend. For the sake of this story, let’s call him Bob. Bob lost access to a pretty important online account.

Bob had mentioned that he wasn’t able to log in to his Facebook account anymore and was wondering if I could help him. Bob is a pretty savvy guy. He’s been using computers for decades for his job in sales and for running his own business. His kids got him a new tablet for Christmas - a Surface, which runs Windows 10, because his kids knew he’d be comfortable with it. 

Bob got his new tablet, ran through the setup process, and tried logging into Facebook, only to not remember his password. He’s been used to his Facebook account remaining logged in on his computer for so long that he couldn’t remember the password. No big deal.

This is where he was at when he asked for my help, so I said sure thing.

Restoring a Forgotten Password

I asked Bob if he had tried clicking the “Forgot account?” link when trying to log in. That gives you a few options to reset your password. Facebook made him go through and prove that it was him - he had to look at some pictures of contacts and match them with their names. Since some of his Facebook friends didn’t use photos of themselves, but instead had pictures of their kids, this was a bit of a challenge for Bob. He had gone through the process but never received an email, so he figured he was stuck.

I walked him through this and, according to Facebook, we gave enough correct answers to generate the password reset email. We logged into Bob’s Gmail account, but that email didn’t show up. That’s when we determined that his Facebook account was tied to Bob’s old Hotmail email account.

I said, “Alright Bob, let’s just log into that Hotmail account, the email should be there.”

Bob replied, “I’m not sure I know the password for that either, usually I’m just logged in on my work computer.”

The Plot Thickens

This makes the situation a little trickier. Fortunately, Hotmail (which now redirects to Microsoft’s online Outlook email service) has its own ways to get back in, provided that the information on the account is up-to-date. I was able to get an automated phone call from Microsoft because Bob’s home phone number was on the account.

Microsoft gave me a 6-digit security code and I was able to reset Bob’s Hotmail email, get to the Facebook reset password email, and reset his Facebook password.

I then helped Bob go into his Facebook account and add his Gmail account as an alternative email. You can do so by going to your Settings > General > Contact and clicking Add another email or mobile number.

Crisis averted, and Bob was grateful! Unfortunately, that’s when I realized that Bob had bigger problems.

There Was a Lot More at Stake Than Just Facebook

Before closing everything and passing the tablet back to Bob, I noticed that his Hotmail account had emails from his bank and his domain registrar (Bob owned a few domains for some local properties that he manages and one for a veterans site he is a part of).

I said, “Hey Bob, it’s really a good thing we got you access again to your Hotmail account - it’s tied to your bank and some other important stuff!” 

I was pretty shocked and concerned for Bob, but he shrugged and said something along the lines of, “Well, that’s why I have you.”

I was flattered of course, but later that evening, Bob and I sat down at a desktop and went through everything together to secure his accounts. If he had not been so lucky to gain access to that old Hotmail account, or if he somehow got logged out from his work computer, he would have had a hard time getting back into his bank account or his domain registrar.

An Online Account Audit

We scoured through Bob’s Hotmail to find any online service that was tied to it. Essentially anything he was using or purposely subscribed to. We found that his cable subscription, Netflix, his bank, his domain registrar, and a few other accounts were all tied to the Hotmail account. 

Bob decided he would rather use his Gmail account for everything, so we took our time and logged into each account, and changed the emails, and while we were at it, we reset the passwords (Bob used the same password on multiple accounts pretty often).

We also set up 2FA or two-step verification on all of the accounts possible, including his Hotmail and Gmail accounts. We made sure each account had his updated address and home phone number, as well as his cell number.

To remember all of these new passwords, we set up a LastPass account, which is one of many password managers. For a single home user, LastPass works great. For small businesses looking to manage their passwords, give Computerware a call at (703) 821-8200 to talk about solutions geared for businesses.

We plugged everything into LastPass and set it up on both his desktop and his new tablet. Now Bob can have unique, complex passwords on all of his accounts and not need to remember them or store them on sticky-notes.

It took a few hours, but together we totally cleaned up Bob’s online accounts and made sense of everything, AND we secured everything with strong passwords and 2FA. This is something everyone should do once a year.

Audit Your Online Accounts

In short, here’s a punch list of what we did, so you can repeat it for yourself. 

  • Log in to each email account you have. Reset the password to something secure and unique.
  • Set up 2FA on each email. You can have the 2FA send the code via a text message, but it’s better to use an authenticator app like LastPass, Authy, or Google Authenticator.
  • Decide what online accounts you want tied to each email. If you have an old email account you want to gradually decommission, plan on moving all accounts to the email you want to use. It’s a little easier when everything is tied to one email account.
  • Log in to each account and confirm that you have it going to the email you want to use.
  • While logged in, reset the password, write it down or use a password manager to log it.
  • While logged in, setup two-factor authentication/multi-factor authentication/two-step verification if the account allows it. Most banks, social networks, and major websites do offer it.
  • Repeat this for every online account. It wouldn’t hurt to scour through your email for older accounts that you don’t use anymore. For example, if you used to have an account with an older cable company, update your email within that account as well, and then delete the account if you no longer need it.

Expect to spend a few hours doing this, especially if you haven’t done it at all over the years. When you are all done though, you’ll be in good shape and never run into an issue where you can’t access something important.

VoIP Solutions Can Have a Ton of Features
Looking at Half a Century of Technology
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 12, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Productivity Email Malware IT Services Saving Money Efficiency Google Computer Small Business User Tips Innovation Collaboration IT Support VoIP Smartphones IT Support Data Backup Quick Tips Network Mobile Devices communications Business Continuity Microsoft Office Gadgets Disaster Recovery Cybersecurity Data Recovery Android Social Media Upgrade Mobile Office Server Communication Virtualization Smartphone Phishing Mobile Device Management Miscellaneous Holiday Ransomware Vendor Management Passwords Apps Operating System Managed IT Services Windows 10 Windows Tech Term Outsourced IT Internet of Things Facebook Unified Threat Management Remote Monitoring Users Mobile Device Automation BDR BYOD Remote Computing Apple Managed IT services Mobile Computing Data Management Analytics Windows 10 WiFi History Artificial Intelligence Marketing Cloud Computing The Internet of Things Training Firewall Browser Save Money Alert App Business Technology Big data Encryption Spam Help Desk Two-factor Authentication Bandwidth Office Information Technology Office 365 Health IT Consultant Access Control Gmail Managed IT Government Windows 7 Cybercrime Content Filtering Maintenance Printer Going Green Hard Drives Bring Your Own Device Budget Antivirus VPN Search Windows 8 Outlook Recovery Employer-Employee Relationship Information Retail Best Practice Lithium-ion Battery Healthcare Tech Support Cost Management Virus Hiring/Firing Managed Service Wireless Technology Computers Saving Time Customer Service Travel Education Update Data Security It Management iPhone Blockchain Remote Work Data Loss Humor IBM Hacking Networking Money Document Management Augmented Reality Project Management Phone System Computing Vendor Intranet Wireless Law Enforcement Twitter File Sharing Website Solid State Drive Hard Drive Compliance Avoiding Downtime Storage Data storage Risk Management Flexibility Mobility Patch Management Save Time Password Voice over Internet Protocol Value Downtime Legal Covid-19 Data Breach Customer Relationship Management Hacker Regulations PowerPoint Applications Proactive IT Computer Repair Running Cable SaaS Administration Conferencing Current Events Software as a Service Social Robot Securty DDoS Monitoring Google Maps Fax Server Black Market Management Cryptocurrency Net Neutrality Word Social Engineering Laptop Vulnerabilities Business Intelligence Cortana Business Growth Scam Digital Payment Excel Router Meetings Private Cloud Wi-Fi Comparison Tablet Company Culture Paperless Office Digital Telephony Websites Machine Learning Sports Disaster Telephone Systems Social Networking User Hosted Solution Cooperation Virtual Desktop End of Support Public Cloud Licensing Cost Co-managed IT User Error Network Congestion Documents Uninterrupted Power Supply IT service Processor Entertainment Vulnerability Identity Theft Teamwork Heating/Cooling Bitcoin Inbound Marketing Streaming Media Data Protection Solutions Lifestyle Bluetooth Professional Services Virtual Reality Politics Multi-factor Authentication Pain Points Automobile Telephone Downloads Emails Chrome eWaste Google Docs Integration Chromebook Memory Experience Computing Infrastructure Hack Cleaning Redundancy How To Monitors Managed Services Provider Computer Accessories Office Tips Download Processors Evernote Gaming Console Virtual Assistant How To Trending USB YouTube Managed Services Distribution Mouse Employee/Employer Relationship Microchip Taxes Presentation Unified Communications Settings Text Messaging Start Menu Tech Terms Distributed Denial of Service Webcam Managed IT Service Smart Devices Programming Specifications Safety Statistics Mobile Technology Language Microsoft Excel Google Play Telephone Service Multi-Factor Security Procurement Computer Care Employer/Employee Relationships Hacks Software License Physical Security Trends Point of Contact Permissions Relocation Devices Tablets Webinar Video Conferencing 3D Ebay Microsoft 365 Banking Fraud Botnet Tactics Digital Signature Thin CLient Google Drive Windows Server 2008 Managing Costs Communitications Music Medical IT Trend Micro Sync PCI DSS Smart Phones switches Writing Spyware Mobile Payment Browsers UTM Content Security Cameras Threats Legislation Error Supply Chain Management Recycling Upgrades Electricity Printing User Tip Proactive Maintenance Notifications IT Plan CCTV Enterprise Resource Planning Analytic Reliable Computing Accountants A.I. Internet Service Provider Adminstration PDF Pirating Information Business Metrics email scam Computer Malfunction Addiction Product Reviews Leadership LiFi Navigation Virtual Machine IT Assessment Read eCommerce In Internet of Things Regulations Compliance Best Available Keyboard cache Television Data Analysis Employees Domains Work/Life Balance GDPR Managing Risk Wireless Headphones Remote Working Deep Learning WannaCry SQL Server Migration Connected Devices Best Practives Tech Hypervisor Scalability Equifax Fleet Tracking Device Management Corporate Profile Motion Sickness Network Management Public Speaking Visible Light Communication Time Management Freedom of Information Electronic Health Records Content Management Holidays Microserver Financial Data Business Managemenet Shortcut IT consulting Assessment SharePoint Fileless Malware Hybrid Cloud Messenger Device security Tracking MSP Upselling Troubleshooting Tip of the week Modem Strategy Nanotechnology Social Network Entrepreneur Google Calendar Proxy Server Azure Rental Service Desktop Finance Memes Touchscreen News Term Startup Cabling Asset Tracking Managing IT Services online Currency Environment CIO Video Surveillance VoIP Electronic Medical Records Transportation Business Cards Web Server Service Level Agreement Get More Done HIPAA Advertising Flash Workers Username Printer Server Surveillance Electronic Payment Staffing Google Wallet Knowledge Recording Optimization Unified Threat Management Administrator Backup and Disaster Recovery Turn Key Telework Saving ZTime Competition Windows XP Consultation Directions Display Books IT Business Owner Society SSID Screen Reader Customer Resource management Remote Workers LinkedIn Displays Technology Tips Dark Web Free Resource Supercomputer Gamification Trojan Fake News Processing Smart Tech Worker Organize Virtual Private Network Debate Micrsooft Audit Health IT Piracy Upload Harddrive IP Address Reading HTML Samsung Development Archive GPS Human Resources Drones Logistics Virtual Machines Fiber-Optic Database FinTech Skype Application Data Warehousing Wasting Time Emergency Hard Drive Disposal Cyber security G Suite Telephone System Data Storage External Harddrive Access Bookmark Mobile Security Employer Employee Relationship Productuvuty Regulation Financial Printers 3D Printing CrashOverride Capital Personal Information Managing Stress

toner1