Why account security matters more than you think
Most account breaches don’t happen through sophisticated hacking. They happen because someone reused the same password across multiple sites, fell for a fake login page, or skipped two-factor authentication. Scammers don’t need technical skills to break into your accounts — they just need one weak point.
The good news: securing your online accounts is straightforward and doesn’t require any technical expertise. This guide walks you through the steps that block the vast majority of unauthorized access — starting with the changes that make the biggest difference.
Step 1: Secure your email account first
Your email is the master key to your digital life. Almost every other account — banking, social media, shopping — uses your email for password resets. If a scammer gets into your email, they can reset the password on virtually everything else.
Change your email password
Create a new password that is at least 12 characters long and unique — meaning you don’t use it anywhere else. A strong password doesn’t need to be random gibberish. A phrase like PurpleTiger$Runs2Fast is both strong and easy to remember. What matters most is length and uniqueness.
Enable two-factor authentication (2FA)
Two-factor authentication adds a second step when logging in — usually a one-time code sent to your phone or generated by an app. Even if someone has your password, they can’t get into your account without that code.
Here’s how to enable 2FA on major email providers:
- Gmail: Go to your Google Account > Security > 2-Step Verification > Get Started
- Outlook/Hotmail: Go to account.microsoft.com > Security > Advanced security options > Two-step verification
- Yahoo Mail: Go to Account Security > Two-step verification
- Apple iCloud: Go to Settings > [Your Name] > Password & Security > Two-Factor Authentication
Which 2FA method is best? An authenticator app (like Google Authenticator, Microsoft Authenticator, or Authy) is more secure than SMS text messages, because text messages can be intercepted in SIM-swapping attacks. If an authenticator app isn’t available, SMS is still far better than no 2FA at all.
Review connected apps and devices
Check which apps and devices have access to your email. In Gmail, go to Security > Your devices and Third-party apps with account access. Remove anything you don’t recognize or no longer use.
Step 2: Secure your banking and financial accounts
After email, your banking and financial accounts are the highest priority targets.
Change your banking passwords
Use a unique, strong password for every financial account — your bank, credit cards, investment accounts, and payment services like Venmo, Zelle, and PayPal. Never reuse your banking password on any other site.
Enable 2FA and account alerts
Most banks now offer two-factor authentication — turn it on. Additionally, enable these alerts:
- Transaction alerts for purchases above a certain amount
- Login alerts for new device access
- Balance alerts for drops below a certain threshold
- International transaction alerts
These notifications let you catch unauthorized activity immediately rather than discovering it days or weeks later on a statement.
Verify your contact information
Make sure your phone number and email on file with your bank are current and correct. If a scammer changes your contact information, the bank’s fraud alerts would go to them instead of you.
Step 3: Use a password manager
If you’re using the same password on more than one site — which most people are — a password manager is the single most impactful change you can make. A password manager creates, stores, and auto-fills unique passwords for every account, so you only need to remember one master password.
How password managers work
A password manager is like a digital vault. You set one strong master password to unlock it, and it stores unique, complex passwords for every account. When you visit a website, the password manager fills in your credentials automatically. You never need to remember individual passwords again.
Recommended password managers
Several reputable password managers are available at different price points:
- Built-in options (free): Apple Keychain (iPhone/Mac), Google Password Manager (Chrome/Android) — these work well if you stay within one ecosystem
- Dedicated managers: Bitwarden (free tier available), 1Password, Dashlane, and LastPass — these work across all devices and browsers
The best password manager is the one you’ll actually use. Even the built-in options on your phone are a massive upgrade over reusing passwords.
Setting up your password manager
- Choose a password manager and install it on your phone and computer
- Create a strong master password — at least 16 characters, something memorable to you but not guessable by others
- Import your existing saved passwords (most managers can do this automatically)
- Start updating your most important accounts (email, banking, social media) with unique generated passwords
- Over the next few weeks, update the rest of your accounts as you log into them
Step 4: Secure your social media accounts
Social media accounts are valuable targets because scammers can use them to impersonate you, send phishing messages to your contacts, or gather personal information for identity theft.
- Settings & Privacy > Password and Security > Two-factor authentication
- Review “Where you’re logged in” and remove unfamiliar sessions
- Check “Apps and websites” for unauthorized third-party access
- Settings > Accounts Center > Password and Security > Two-factor authentication
- Review “Login activity” and end unfamiliar sessions
X (formerly Twitter)
- Settings > Security and account access > Security > Two-factor authentication
- Review “Apps and sessions” for unauthorized access
- Settings > Sign in & Security > Two-step verification
- Review “Where you’re signed in” and close unknown sessions
Step 5: Check for compromised passwords
Your password may already be exposed without you knowing. Data breaches at large companies regularly leak millions of passwords, and scammers buy these leaked databases to try logging into other accounts.
Check whether your email or passwords have been exposed:
- Have I Been Pwned: Visit haveibeenpwned.com and enter your email address. It checks your email against known data breaches and tells you which services were compromised.
- Google Password Checkup: If you use Chrome, go to passwords.google.com > Password Checkup. It flags reused, weak, and compromised passwords.
- Your password manager: Most dedicated password managers include a security audit feature that identifies weak, reused, and breached passwords.
If any of your passwords appear in a breach, change them immediately — especially if you’ve used that same password on other accounts.
Step 6: Be cautious with password reset emails
Scammers frequently send fake password reset emails that look like they’re from real companies. These emails contain links to fake login pages designed to steal your credentials. This is one of the most common email phishing scam tactics.
Follow these rules for password reset emails:
- If you didn’t request a password reset, don’t click the link. Delete the email.
- If you’re concerned about your account, go directly to the website by typing the address into your browser — not through the email link.
- Check the sender’s email address carefully. Scammers use addresses like
security@amaz0n-support.cominstead of the real@amazon.com.
For a deeper dive into recognizing fake websites, see our guide on how to spot fake login pages and phishing websites.
Step 7: Keep your devices updated
Software updates aren’t just about new features — they fix security vulnerabilities that scammers can exploit. An unpatched device is an open door.
- Phone: Enable automatic updates in Settings > Software Update (or System Update on Android)
- Computer: Enable automatic updates in System Preferences (Mac) or Settings > Windows Update (Windows)
- Browser: Use the latest version of your browser and enable auto-updates
- Apps: Enable auto-updates in your device’s app store
Account security checklist
Use this checklist to track your progress. You don’t need to do everything in one sitting — work through it over a week:
- Email: unique password + 2FA enabled
- Banking: unique password + 2FA enabled + alerts on
- Social media: unique passwords + 2FA enabled + sessions reviewed
- Password manager installed and being used
- Checked haveibeenpwned.com for breached accounts
- Device software up to date
- Connected apps and third-party access reviewed
Account security isn’t about achieving perfection — it’s about building habits that close the most common gaps. Every step you complete makes your accounts significantly harder for scammers to access.
Related resources
- How To Spot Fake Login Pages and Phishing Websites — Learn the visual and technical clues that separate real login pages from scammer-built fakes designed to steal your password.
- Account Takeover Scams: How Criminals Steal Your Logins and What to Do — Understand the tactics scammers use to break into accounts and the specific steps to recover if it happens to you.
- What Real Companies Will Never Ask You To Do — Know the red lines that legitimate companies never cross, so you can instantly spot imposters.