{"id":14198,"date":"2019-10-23T11:19:51","date_gmt":"2019-10-23T15:19:51","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/do-not-abandon-your-accounts\/14198\/"},"modified":"2020-07-20T20:37:15","modified_gmt":"2020-07-20T16:37:15","slug":"do-not-abandon-your-accounts","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/do-not-abandon-your-accounts\/14198\/","title":{"rendered":"6 accounts you should never abandon"},"content":{"rendered":"<p>Can you recall every online service account you have? Maybe you signed up to access some content or because a friend asked you to, then lost interest. Many users simply stop logging in and don\u2019t bother to delete their accounts. The accounts sit there, dormant, waiting to be hacked \u2014 but if they are, you won\u2019t know about it anytime soon, if ever.<\/p>\n<h2>Abandoned account: What could go wrong<\/h2>\n<p>Does it really matter what happens to an unwanted profile, though? If it gets hacked, so what? You didn\u2019t need it anyway. However, in some cases, an abandoned account can be exploited to gain access to resources and important information that you <em>do<\/em> need. Here\u2019s what you need to know.<\/p>\n<h3>1. Social network accounts<\/h3>\n<p>Few people regularly check their accounts in all of their social networks. Say, for example, a person creates a Facebook profile, uses it to log in to Instagram and other services (handy, right?), and then realizes he doesn\u2019t actually need Facebook \u2014 not an uncommon scenario. Sure, the social network continues to send e-mail notifications if the user didn\u2019t bother to disable them, but they get filtered into a separate folder that he quit checking long ago.<\/p>\n<p>Again, a more-than-plausible scenario. When the user receives an e-mail warning that someone logged into his account from an unknown device, he doesn\u2019t see it. The cybercriminals who logged in have a free shot at the accounts linked to Facebook. They will also probably have time to <a href=\"https:\/\/www.kaspersky.com\/blog\/give-me-your-money\/20182\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">sting some of the victim\u2019s friends or followers<\/a> on Facebook.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>Set up two-factor authentication. Lots of services offer it; here are our posts on setting up security, including 2FA, in <a href=\"https:\/\/www.kaspersky.com\/blog\/facebook-security-settings\/13330\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Facebook<\/a> and <a href=\"https:\/\/www.kaspersky.com\/blog\/twitter-security\/11860\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Twitter<\/a>.<\/li>\n<li>Enable notifications about account logins from unknown devices \u2014 and pay attention to them.<\/li>\n<\/ul>\n<h3>2. Backup e-mail address<\/h3>\n<p>Many people set up a separate e-mail account for mailings and notifications so as not to clutter up their main mailbox, and use it for registering everything and anything, including profiles with important data. And no incoming e-mails there are from real-life people, so they don\u2019t check it very often. Therefore, they may not notice for a long time that their backup e-mail has been hacked\u00a0\u2014 at least not until they lose access to a very important account.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>Enable two-factor authentication for this account.<\/li>\n<li>Set up forwarding of messages from this mailbox to a separate folder in your primary e-mail account.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n<h3>3. Password manager<\/h3>\n<p>What if you saved your account credentials in a password manager, and then decided to replace it with a different app? The profile in the old manager doesn\u2019t go anywhere, and neither do the passwords in it (half of which you probably didn\u2019t change). If someone gains access to this profile, they will be able to get into your accounts. And even if you do discover the theft of an account, it won\u2019t be immediately obvious how the cybercriminal got hold of the password for it.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>Delete accounts in password managers if you no longer use them.<\/li>\n<\/ul>\n<h3>4. Online store account<\/h3>\n<p>Many stores invite you to link a bank card or online wallet to your account to make shopping easier. Some even do it automatically. If you are a frequent user, the temptation to do so is great. In addition, the profile is likely to contain your home or work address for delivery of goods, plus other valuable personal data.<\/p>\n<p>But there may come a time when you stop using the service. If the account remains live and gets hacked, the cybercriminals will gain access to your data, which you will probably find out about only when they try to buy something in your name. Or just buy, without the trying bit, since not all services request an SMS code to confirm the transaction.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>Do not link a bank card to an online store account.<\/li>\n<li>If the service saves the card automatically, don\u2019t forget to unlink it.<\/li>\n<li>Consider using a separate card with access to a small amount of money for online shopping.<\/li>\n<\/ul>\n<h3>5. Google work account<\/h3>\n<p>It is common to create separate Google accounts if you need access to Google Analytics and other services at work. Keeping personal and work profiles separate makes perfect sense. The problem is that many people forget to delete Google work accounts when they change jobs.<\/p>\n<p>As a rule, company-created accounts are immediately blocked by IT security after the user departs. But they might miss ones that the former employee set up on their own, such as a Google account. The result could be one or more unclaimed accounts swimming around in the online ocean, offering passing sharks access to work documents and other confidential information. The hacking of such an account will be very, very hard to detect, because no one will even remember it exists.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>The outbound employee doesn\u2019t need to take any additional steps.<\/li>\n<li>The company has to revoke access to all services and Google accounts used by said employee.<\/li>\n<\/ul>\n<h3>6. Phone number<\/h3>\n<p>To keep their main phone number out of spam databases, some users have a separate one for various services, loyalty cards, bonus programs, public Wi-Fi networks, and so on. And sometimes the same phone number is used for two-factor authentication as well. Although technically a number is not an account and cannot be abandoned in the full sense of the word, problems can still arise. On the one hand, a number of accounts are linked to this number. On the other hand, you are unlikely to use this number for calling or texting.<\/p>\n<p>The bottom line for the telco, meanwhile, is that an unused SIM is unprofitable. If you need a number solely to receive SMS messages and never spend anything on the account, the carrier can block it in three months and then resell it.<\/p>\n<p>Sometimes those numbers are snapped up instantly, so you may not have time to relink your accounts to the new SIM. The buyer, on the other hand, will be able to find your accounts in the respective online services\u00a0\u2014 and if they change the passwords, recovering won\u2019t be easy.<\/p>\n<p>In particularly unfortunate cases, the new owner can even get access to bank accounts and online wallets linked to the number and spend your money before you have time to notify the bank. For example, a woman in California had <a href=\"https:\/\/www.computerworld.com\/article\/3134886\/lyft-customers-face-potential-hack-from-recycled-phone-numbers.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">her credit card charged<\/a> after her operator recycled her number to another customer.<\/p>\n<p><strong><b>What to do<\/b><\/strong><\/p>\n<ul>\n<li>Set a reminder to yourself to call or send a text from your additional phone number at least once a month.<\/li>\n<li>Always keep a positive balance on this phone.<\/li>\n<\/ul>\n<h2>How to avoid problems with abandoned accounts<\/h2>\n<p>As you can see, even an unneeded account can cause a lot of problems if hijacked. Preventing a problem is much easier than dealing with its consequences. Therefore, we recommend that you keep track of your accounts. Here are some general handy tips:<\/p>\n<ul>\n<li>Recall which online services you have registered for. Check which phone numbers and e-mails your accounts in social networks, online stores, banks, and other important services are linked to, and unlink all current profiles from inactive phone numbers and mailboxes.<\/li>\n<li>If you log in somewhere through Facebook, Twitter, or Google, or keep an additional e-mail or phone number for newsletters, public Wi-Fi, etc., check those accounts from time to time.<\/li>\n<li>If you decide to stop using a password manager, online store, or social media account, <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/delete\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">delete your accounts in these services<\/a>.<\/li>\n<li>Turn on account login notifications in services that have this option \u2014 and review those notifications promptly.<\/li>\n<li>Use a security solution such as <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>, which will notify you of leaks in services you use.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t use the service? Delete your account. We explain which accounts are dangerous to leave dormant\u00a0\u2014 and why.<\/p>\n","protected":false},"author":2484,"featured_media":14199,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[2088,1474,2323,1815,187,2186,98],"class_list":{"0":"post-14198","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-tips","9":"tag-accounts","10":"tag-digital-comfort-zone","11":"tag-e-mail","12":"tag-passwords","13":"tag-phone-number","14":"tag-social-networks"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/do-not-abandon-your-accounts\/14198\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/do-not-abandon-your-accounts\/16809\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/do-not-abandon-your-accounts\/6558\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/do-not-abandon-your-accounts\/18793\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/do-not-abandon-your-accounts\/16839\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/do-not-abandon-your-accounts\/15598\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/do-not-abandon-your-accounts\/19518\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/do-not-abandon-your-accounts\/18166\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/do-not-abandon-your-accounts\/23801\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/do-not-abandon-your-accounts\/6577\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/do-not-abandon-your-accounts\/29029\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/do-not-abandon-your-accounts\/12475\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/do-not-abandon-your-accounts\/12578\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/do-not-abandon-your-accounts\/11395\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/do-not-abandon-your-accounts\/20537\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/do-not-abandon-your-accounts\/24381\/"},{"hreflang":"nl","url":"https:\/\/www.kaspersky.nl\/blog\/do-not-abandon-your-accounts\/24736\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/do-not-abandon-your-accounts\/19254\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/do-not-abandon-your-accounts\/23575\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/do-not-abandon-your-accounts\/23422\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/accounts\/","name":"accounts"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2484"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14198"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14198\/revisions"}],"predecessor-version":[{"id":17065,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14198\/revisions\/17065"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/14199"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}