Account protection
This service helps secure online accounts: setting up robust passwords, enabling two-factor authentication (2FA), choosing and configuring a password manager. It addresses prevention of phishing, identity theft, account takeover and other fraud schemes flagged by the NCSC.
What this service can offer
- Assess the strength of existing passwords and propose robust passwords (length, complexity, uniqueness).
- Set up or strengthen two-factor authentication (2FA) on essential accounts (email, banking, social media, cloud).
- Choose and configure a password manager suited to your use (local, encrypted, securely synchronised).
- Identify at-risk accounts (weak or reused passwords, no 2FA) and prioritise improvements.
- Spot signs of account compromise (suspicious logins, unauthorised changes, email forwarding rules).
- Raise awareness of best practices against phishing, social engineering and password-cracking attempts.
- Reconstruct a timeline of the security actions carried out.
- Document the configurations put in place and provide a follow-up notice.
What the service cannot guarantee
- That an account will never be compromised, even with the best protections.
- Recovery of an account already hacked or locked without the cooperation of the service provider.
- Complete erasure of every trace of a past compromise.
- Action without a prior written mandate when the intervention touches accounts or devices belonging to others.
- Replacement of the official account recovery procedure of the service provider.
- Replacement of a judicial expertise or police investigation in proven fraud cases.
Process applied
Definition of context, accounts involved and security objectives.
Inventory and evaluation of risk factors (weak or reused passwords, no 2FA).
Implementation of robust passwords and a password manager.
Activation and configuration of two-factor authentication (2FA) on priority accounts.
Verification of security settings (forwarding rules, connected apps, recent activity).
Reconstruction of a timeline of the security actions carried out.
Documented synthesis with cited sources, configurations applied and follow-up recommendations.
For more information, see the dedicated guide on DIGITALABS: Cybersecurity / Authentication