Here you will find the steps you should take if you suspect that an unauthorized person has or had access to your Zattoo account.
1. Change your password
If you suspect abuse of your Zattoo account, please change your password immediately. If you use the same password for multiple online services, change the password for all affected services and make sure you do not use the same password twice.
Here you will find instructions on how to change your password for Zattoo.
Here you will find instructions on how to request a new password if you forgot your old password.
If you use Zattoo FREE, you can easily delete your account and create a new one with a different password. Click here for instructions. PREMIUM and ULTIMATE users should contact Zattoo Support directly via this contact form in case account deletion and subsequent recreation is needed.
Here you will find instructions on how to delete a Zattoo account.
2. Use individual passwords
Individual passwords keep the password abuse to a minimum. Therefore, it is recommended to create individual passwords for each online account.
What is a secure password?
A recommendation for a secure password from the Federal Ministry for Information Security can be found here. Further recommendations can also be found here.
3. Use Password Manager
Since it can be a challenge to remember dozens of different credentials, password managers come in handy. They allow you to store all log-in data in an encrypted database. You secure it with a password that is as complex as possible and then only need to remember one password to secure all passwords.
Most password managers have an integrated password generator or offer password generators on their websites. For example, you can use 1Password, Dashlane or LastPass.
4. Keep your software up to date
Not only online services, but also your local computer should be protected. It is very important to keep the software you are using up-to-date. The operating system, all browsers and also local mail programs should be updated automatically. Please also make sure that new softwares should only be installed from trustworthy sources, i.e. preferably from official App Stores of the operating system manufacturer or from the website of the manufacturer.
Find general tips for the maintenance of your computer or mobile device here:
Basic protection for computers & smartphones
5. Watch out for phishing attempts
A phishing attack can often look like a mail from a known service, with flawless wording, which can even be an exact copy of a real mail in which only a single link has been replaced. More and more phishing mails are being set up with a personal greeting and a full name. For this reason, it can be difficult to recognize such an e-mail immediately. Therefore, be careful and pay attention to logo, graphic design, grammatical language and greeting. If you find any suspicious information or hint, it is recommended to have a closer look at it and to contact the respective service.
A clear hint can be a link leading to an external website, aiming to trick the user into revealing important data. Special care should be taken here if the link leads to an astonishingly well-constructed page that does not differ significantly from the original at first glance (logo, structure, etc.) and payment data is requested or needs to be verified again.
The consumer advice centre gives an overview of how to identify a possible phishing attempt.
6. Info to the respective service
If you suspect unusual account activity or phishing attempts, contact the relevant service or support to see if these suspicious activities can be confirmed.
Comments
0 comments
Article is closed for comments.