Account protection

← All our services

Account protection

This service helps secure online accounts: setting up robust passwords, enabling two-factor authentication (2FA), choosing and configuring a password manager. It addresses prevention of phishing, identity theft, account takeover and other fraud schemes flagged by the NCSC.

What this service can offer

  • Assess the strength of existing passwords and propose robust passwords (length, complexity, uniqueness).
  • Set up or strengthen two-factor authentication (2FA) on essential accounts (email, banking, social media, cloud).
  • Choose and configure a password manager suited to your use (local, encrypted, securely synchronised).
  • Identify at-risk accounts (weak or reused passwords, no 2FA) and prioritise improvements.
  • Spot signs of account compromise (suspicious logins, unauthorised changes, email forwarding rules).
  • Raise awareness of best practices against phishing, social engineering and password-cracking attempts.
  • Reconstruct a timeline of the security actions carried out.
  • Document the configurations put in place and provide a follow-up notice.

What the service cannot guarantee

  • That an account will never be compromised, even with the best protections.
  • Recovery of an account already hacked or locked without the cooperation of the service provider.
  • Complete erasure of every trace of a past compromise.
  • Action without a prior written mandate when the intervention touches accounts or devices belonging to others.
  • Replacement of the official account recovery procedure of the service provider.
  • Replacement of a judicial expertise or police investigation in proven fraud cases.

Process applied

1

Definition of context, accounts involved and security objectives.

2

Inventory and evaluation of risk factors (weak or reused passwords, no 2FA).

3

Implementation of robust passwords and a password manager.

4

Activation and configuration of two-factor authentication (2FA) on priority accounts.

5

Verification of security settings (forwarding rules, connected apps, recent activity).

6

Reconstruction of a timeline of the security actions carried out.

7

Documented synthesis with cited sources, configurations applied and follow-up recommendations.


For more information, see the dedicated guide on DIGITALABS: Cybersecurity / Authentication