MouthShut.com Would Like to Send You Push Notifications. Notification may includes alerts, activities & updates.

OTP Verification

Enter the 4-digit code
For Business
MouthShut Logo
ENidhi India Operational Policies
May 12, 2008 02:08 PM 5363 Views
(Updated May 20, 2008 02:10 PM)

Recently the gmail id of one of ex classmate was hacked into and the hacker made maximum possible misuse of the account before corrective measures could be taken.(The hacker sent indecent images, chatted with all contacts, altered orkut profile and even made an attempt to change bank account password of my classmate(which was spoiled thanks to SMS alert system the bank has) My classmate could identify the identity theft, trigger damage control initiatives and eventually was able to regain the control of gmail account but damage done in the interim period was permanent.


I am just trying to imagine what all a hacker can do if he/she manages to break into my Google account. I have a far greater presence on net than my classmate(blogger and several other Google services) and misuse can be dangerous.


While every precaution is being taken to avoid such a situation, this post is a preventive measure towards Business Continuity and aims to keep my readers informed how they can detect an identity theft.


Below are a set of Operational Policies this user(Shrinidhi Hande) will always be adhering to during his online activities. If you observe any deviation from these stated policies, it is extremely likely that something is wrong and you're advised to proceed with extreme caution.


Continue reading at https://**enidhi**.net/2008/03/fyi-**enidhi**-india-**operational**-**policies**
.html

image

Comment on this review

Read All Reviews

MouthShut's Top Picks: Must-Read Articles

See all
X