Symptoms of a Hacked Email Account

Stressed businessman working at an office.
Stressed businessman working at an office.

“My clients received spam/phishing emails from my work email. What do I do?”

If a client has contacted you about a suspicious email sent from your account, take action immediately. It may be a warning signal that a hacker has not only gained access to your email account, but to your company’s network as well.

Your clients recognize and trust the messages they receive from you. That’s why hackers use your good name—it gets them past the usual IT defenses and straight to your clients’ data, often using phishing as their method of attack.

Download Phishing Email Examples

3 Symptoms Your Email Is Hacked & What to Do About It

While some hackers spoof email addresses (which requires no access to your actual email account), emails sent to your key contacts indicate a well-researched hack—especially when those emails include contextually accurate subject matter (e.g. You are an accountant and the hacker attached a phony invoice).

In summary, an attempt at phishing “in your name” is especially troubling because it could signify that your data has already  been accessed by a hacker. This has huge implications for your company’s health and the sooner it is addressed, the better the outcome will be for your company’s reputation, security, and profitability.

Addressing a Small Issue Now Can Prevent a Major Issue Down the Road

A hacked email can be a symptom of cyber security weaknesses, but you aren’t the first to experience it and you won’t be the last. In fact, you could be one of the first among your competitors to adopt solid security practices.

Are you concerned you may have been hacked? Talk to an Corsica Technologies security advisor. Email ITsecurity@edts.com or call 1-855-411-3387 EXT 2.

EMAIL HACKED?

3 Symptoms & What to Do About It

1. People are receiving emails you didn’t send.

Your LinkedIn and business connections are reporting emails with links and attachments that don’t seem to work—all sent from your personal email or key accounts at your place of business.

2. You are having trouble eradicating viruses from one of your computers.

The same virus keeps showing up in your scans—even after restoring your device.

3. You have seen remote login alerts but can’t find them later.

This is a sign that a hacker is in your email account (or network) and attempting to cover their tracks.

WHAT TO DO

1. Notify Your IT Department

They will likely need your device to run scans and (possibly) perform a hard reset. In the meantime, change your passwords and warn your contacts not to click links in emails they weren’t expecting from you.

2. Document Your Data

Hackers often gain access to your email by first gaining access to your device. Give your IT team a list or summary of the types of sensitive data you have access to, whether client records, passwords, company financials, etc.

3. Initiate Incident Response

IT departments should bring in an incident response team to find the source or risk missing an active intruder with a backdoor into your network, devices, and data.

4. Find the Gaps

After the infection source is taken care of, begin a security risk assessment to locate which weaknesses in your security were exploited by hackers. You may find you need phishing training for employees or security monitoring.

Corsica Technologies
Corsica Technologies is an MSP specializing in cybersecurity solutions, managed IT services, digital transformation, and data integration. Corsica provides solutions for midmarket businesses including network monitoring, data protection, incident response, and IT support. Corsica offers unmetered technology services for fully managed or co-managed teams to address all technology needs under a one-flat monthly fee. 

Related Cybersecurity and IT Reads

vCISO services - Corsica Technologies
Consulting
Ross Filipek

vCISO Services: Staying Secure for Less

In this article: What is a vCISO? vCISO vs CISO Why choose a vCISO? What to look for vCISO pricing How to hire a vCISO 💡Free vCISO Pricing Calculator Access the Calculator The average cost of a data breach is

Read more
M&A consulting - Corsica Technologies
Consulting
Garrett Wiesenberg

Streamlining the M&A Process with Expert Consulting

Mergers and acquisitions are some of the most stressful processes in the business world. The stakes are high, and there are many risks alongside incredible opportunities. How do you navigate the waters of M&A? Consulting services are a huge help.

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.

Ready to talk to an expert?

We’ll respond within 1 business day, or you can grab time on our calendar.