Worried that your email might be on the dark web? Want to know what to do if it is?
This hidden part of the internet has legitimate uses, but can also be a hangout for scammers.
Here’s a breakdown of how your data gets there, the risks, and how to protect yourself.
1/6 🧵👇
Emails typically end up on the dark web through breaches.
Hackers breach databases and sell data, allowing scammers to create phishing scams, target ransomware, or commit identity fraud.
Acting quickly once you become aware of a breach helps to minimize the damage.
2/6
Signs your email might be compromised:
⚠️ Suspicious emails or account notifications
⚠️ Payments you didn’t authorize
⚠️ Password change alerts
⚠️ Emails sent from your account that you didn’t write
If any of these are happening to you, it's time to act!
3/6
If your email is on the dark web, here’s what to do:
🗣️ Notify authorities (IC3, Action Fraud, your bank)
🔺 Change all your passwords
🔑 Enable two-factor authentication (2FA)
These actions may help you slow down attackers and minimize the damage caused by an attack.
4/6
Prevent your email from appearing on the dark web by:
🔒 Using a password manager for strong passwords and secure storage
🎭 Using alias emails to protect your real address
You can also protect yourself by using monitoring tools such as Proton’s Dark Web Monitoring.
5/6
Your email is your online identity. Treat it with caution.
Taking action quickly can prevent more serious damage later. Doing so proactively is even better.
Have you ever been notified that your email was leaked? What did you do next?
While most people realize by now that Password123 is a terrible choice, did you know something like Ch@ll3ng3r%$ isn’t much better?
Read on for three 🔥 hot 🔥 tips on how to create strong passwords. 🧵⬇️ (1/5)
🥇 Use a reputable password manager. And if you want to get fancy, use one like #ProtonPass that generates random email aliases to further secure your online identity. (2/5)
🤖 Make sure your password manager can also generate passwords for you. Computers are way better at creating strong, unique, random passwords than humans. (3/5)