WHAT TO DO IF YOUR INSTAGRAM ACCOUNT HAS BEEN HACKED

Get Free Anti Malware

It’s important that you make sure that you have no spyware on your computer. if you do you could be back at square one after recovering your accounts.

Update your AV Detection

Having the best anti-virus solution is the baseline of any defensive cyber security solution. Make sure you are well protected and alert to all of the threats that are on the internet.

Google has become a big part of our day to day lives, most people have a google email account to access google play store and these credentials are often used in SSO (single Sign On) for other applications or services.

When so much information is stored within this google account what would you do if your account got hijacked, breached or compromised? This could potentially lock you out of a load of services and leave your social network open to abuse from a third party.

SO WHAT IF MY ACCOUNT WAS HACKED?!

Firstly, if your Instagram account has been hacked then there is a good chance your email has been hacked as well.  What you would need to do first would be to report it to Instagram. If you are unable to log into Instagram but can still access the email address associated with the account, then you can go through the ‘forgot’ password process to recover your Instagram account and change the associated password. If you are unable to log onto your Instagram account then you can report the breach to Instagram via this link: https://www.facebook.com/help/contact/196687840820038

You can indicate on the form that you no longer have access to your email account and provide an alternate email account that you do have access to.

If the email address associated with your Instagram account is your google account, hopefully, you can recover this account using the google account recovery process: https://accounts.google.com/signin/recovery

Once you have secured your email account, recover your Instagram account and change your password to a secure password. Wherever possible make sure you are using MFA (multi-factor authentication) as an added layer of security.

 

Here are 6 things you can do to help keep your Instagram account safe:

  1. Pick a strong password. Use a combination of at least six numbers, letters and punctuation marks (like! and &). It should be different from other passwords you use elsewhere on the internet.
  2. Change your password regularly, especially if you see a message from Instagram asking you to do so. During automated security checks, Instagram sometimes recovers login information that was stolen from other sites. If Instagram detects that your password may have been stolen, changing your password on Instagram and other sites helps to keep your account secure and prevent you from being hacked in the future.
  3. Never give your password to someone you don’t know and trust.
  4. Make sure your email account is secure. Anyone who can read your email can probably also access your Instagram account. Change the passwords for all of your email accounts and make sure that no two is the same.
  5. Log out of Instagram when you use a computer or phone you share with other people. Don’t check the “Remember Me” box when logging in from a public computer, as this will keep you logged in even after you close the browser window.
  6. Think before you authorise any third-party app.

Other things to consider doing to limit your risks are:

Google security Checkup

  1. Set a recovery phone and email.
    Check your recover email and phone settings. These are used in case you get locked out of your account. This should also send you an alert email to the recovery mail account if your account is logged onto by a non-trusted device.
  2. If not already done so, Set up 2 factor authentication for Instagram.


WHAT IS 2 FACTOR AUTHENTICATION?

Two-factor authentication is a security feature. When two-factor authentication is on, every time you log into Instagram from an unknown device you’ll be asked to enter an SMS security code or backup code in addition to your username and password.

To turn two-factor authentication on:

Go to your profile and tap the cog (iOS) or the 3 dots (Android) in the top-right corner

Scroll down and tap Two-Factor Authentication

Tap the slider for Require Security Code to move to the on position

If your account doesn’t have a confirmed phone number, you’ll be asked to enter a phone number. After entering the phone number, tap Next.

A code will be sent to you. Enter that code and tap Next.

Note: After you’ve turned on two-factor authentication, you’ll be able to access backup codes for your account. If you don’t receive an SMS security code during the two-factor authentication login process, you’ll still be able to log into your account by using a backup code.

To turn two-factor authentication off:

Go to your profile and tap the cog (iOS) or the 3 dots (Android) in the top-right corner

Scroll down and tap Two-Factor Authentication

Tap the slider on Require Security Code to move to the off position

Then tap Turn Off at the bottom of the message that appears

Keep in mind that you must have a confirmed telephone number for your Instagram account to use two-factor authentication. When you enter a telephone number to turn on two-factor authentication it will become the confirmed number for your account.

What is a backup code?

When two-factor authentication is on, every time you log into Instagram from an unknown device you’ll be asked to enter a backup code or a SMS code in addition to your username and password.

If an SMS security code can’t be sent due to connectivity or SMS delivery issues, you’ll still be able to complete the two-step authentication process with a backup code.

Click here to find out more about backup codes: https://help.instagram.com/1006568999411025

SPECIALISTS IN CYBER SECURITY

Here at CYBER123 we believe that prevention and training is the best way to secure your digital world. If we can train you on what things to spot, how scams and cybercrime works then we believe you are less likely to become a victim. Our unique training offers scenarios and advice on what to spot how to protect yourself and how to deal with the scams and frauds that are about in the world today.

Understanding the resources that support critical functions and the related cyber security risks enable businesses to define resources and efforts in mitigating the risks

CALL US:  +44 (0)20 3457 4683 EMAIL US: info@cyber123.com

IT ONLY TOOK 5 MINUTES TO GET YOUR DATA

If I have your work email address, generally, now I will have your first name and surname and the company you work for.

WHAT TO DO IF YOUR INSTAGRAM ACCOUNT HAS BEEN HACKED

Firstly, if your Instagram account has been hacked then there is a good chance your email has been hacked as well. What you would need to do first would be to report it to Instagram.

TELEPHONE SPOOFING

Telephone spoofing is easy to do, all you have to do is create an account on a website, enter a few telephone numbers and you get to call someone as if you were someone else.

Is your child being Cyber Bullied

Parents can find it difficult to tell the difference between the emotional development of their children or whether something more sinister is taking place.
A lot of the times it is normal for growing children to have mood swings, quiet periods, manic periods and changes of emotional circumstance but sometimes these can also be a sign that they are being bullied or bullying others.

From Xero to Zero

To test and check the security of Xero online accounting software I wanted to see if they were susceptible to MITM attacks. I created a trial account and signed up and logged into Xero using standard 1FA (1 Factor Authentication –ie, password). I installed the Xero APP on my phone and Logged in being able to Skip MFA (Multiple Factor Authentication).

Three Mobile Data Breach

According to news reports some 6 million customer records have been stolen from Three Mobile (one of the UK’s largest mobile network providers). In order to commit this type of upgrade fraud the attackers must have used authorised login credentials to access the upgrades systems. Data accessed would have included names, phone numbers, addresses and date of births of customers.

Three reasons to worry about worms

Worms are a type of malware similar to viruses in that it is self-replicating. However, worms don’t generally attach themselves to applications. Why should you worry about worms?

The Day the Internet Died

Twitter, Spotify, Reddit, PSN and a whole load of other internet services and websites were down or left partially working on Friday. This happened when hackers launched an extremely large Distributed Denial of Service (DDoS) attack on Dyn DNS Servers. Dyn is a major host of internet DNS servers. It looks like Dyn was hit with up to 4 attacks lasting most of Friday.

3 reasons to worry about spyware

Obviously spyware is not something that you would like to have on your computer, tablet or mobile phone but should you be worried about spyware? Some of the stories I have heard are just scary!

Are you infecting your customers?

Earlier in the year mobile provide O2 had marketing campaign where they were promoting an e-book. To distribute their e-book they sent out free USB memory sticks to their customers. Unfortunately for them the e-book wasn’t the only thing on the USB sticks and unwitting customers that plugged the USB sticks into a windows devices found themselves infect with a virus.

SIGN UP TO OUR NEWS LETTER

Footer Contact

1 + 4 =

Share This

Share this post with your friends!