{"id":347,"date":"2020-06-02T12:47:41","date_gmt":"2020-06-02T04:47:41","guid":{"rendered":"https:\/\/www.wesbytes.com\/guide\/?post_type=kb&#038;p=347"},"modified":"2026-01-12T11:05:35","modified_gmt":"2026-01-12T03:05:35","slug":"compromised-email-account-recovery","status":"publish","type":"kb","link":"https:\/\/www.servergigabit.com\/guide\/kb\/compromised-email-account-recovery","title":{"rendered":"Compromised Email Account Recovery"},"content":{"rendered":"<h3><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/cdn-icons-png.flaticon.com\/512\/9971\/9971330.png\" alt=\"Compromised\u00a0Email Account\u00a0Recovery\" width=\"246\" height=\"246\" \/><\/h3>\n<h3>Compromised\u00a0Email Account\u00a0Recovery<\/h3>\n<p><strong>The steps to recover your email ACCOUNT.<\/strong><\/p>\n<p>1. Change the email account\u2019s password.<\/p>\n<ul>\n<li>At least 8 alphanumeric characters with a mix of capital letters, numbers and symbols.<\/li>\n<li>Should not be equivalent to the email username.<\/li>\n<li>Do not use previous password.<\/li>\n<li>Do not use similar password among email accounts.<\/li>\n<\/ul>\n<p>2. Identify all the computers which have been used to log into this email account, and perform a malware scanning using an <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/antimalware\" rel=\"nofollow noopener\" target=\"_blank\">ANTI MALWARE<\/a> software with the latest signature updates.<\/p>\n<p>3. Update control panel main account\u2019s password to have a strong password.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Compromised\u00a0Email Account\u00a0Recovery The steps to recover your email ACCOUNT. 1. Change the email account\u2019s password. At least 8 alphanumeric characters with a mix of capital letters, numbers and symbols. Should not be equivalent to the email username. Do not use previous password. Do not use similar password among email accounts. 2. Identify all the computers which have been used to&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"kbtopic":[11],"kbtag":[1221,1346],"class_list":["post-347","kb","type-kb","status-publish","hentry","kbtopic-general-email","kbtag-email","kbtag-recovery"],"_links":{"self":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb"}],"about":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/types\/kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/comments?post=347"}],"version-history":[{"count":4,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/347\/revisions"}],"predecessor-version":[{"id":5827,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kb\/347\/revisions\/5827"}],"wp:attachment":[{"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/media?parent=347"}],"wp:term":[{"taxonomy":"kbtopic","embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kbtopic?post=347"},{"taxonomy":"kbtag","embeddable":true,"href":"https:\/\/www.servergigabit.com\/guide\/wp-json\/wp\/v2\/kbtag?post=347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}