yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Our Prayers Are With You, Boo | Wicked Tuna: Outer Banks
[Music] All right, man, we’ll give a prayer this morning. Everybody needs it, and we’re going to do it. Lord, we’ll come for you this morning headed out here to the east. I want to thank you for that sunshine. Well, we’re looking at our morning star, th…
BEST Images of the WEEK! ... IMG! #28
When your house breaks, fix it. And a private toilet! It’s episode 28 of IMG. Do you like cake? Do you like tacos? Well, get yourself a Taco Bell cake covered in say cheese, then say arson. Just don’t burn down the melting stairs. Wieners for kids! But z…
You Don't Need Dopamine Detox
If you’re watching this video on your phone, chances are that before I’m done talking, you’ll get a notification, a text from a friend, a like on a recent post you just shared, or a new follower or subscriber. When this happens, do you feel a rush, a sens…
Mitigation and Adaptation: Human Stories of Hope | Explorers In The Field
(soothing guitar music) Climate change is a human story. The causes of climate change are man-made, and the solutions must be man-made. How much of the landscape— In order to reduce climate change, in order to adapt to these changes and to mitigate our i…
Explorer Albert Lin searches for the lost city of the Maya | Lost Cities With Albert Lin
Maya guides, K’in and Bor, will lead us to the mountain. And Mexican archeologist and climber Arcelia García will help me explore it. That’s got to be the Red Mountain. It looks like it. Chak Aktun. Chak Aktun, or Red Mountain, lies around two miles to t…
Primary Elections Explained
Primary elections are how political parties in the United States pick their strongest candidate to run for president. The parties do this by holding mini-elections in each of the states, and the candidates with the most votes from these elections become t…