Your review is Submitted Successfully. ×
Shrinidhi H@enidhi
May 12, 2008 02:08 PM, 5302 Views
(Updated May 20, 2008)
ENidhi India Operational Policies

Recently the gmail id of one of ex classmate was hacked into and the hacker made maximum possible misuse of the account before corrective measures could be taken.(The hacker sent indecent images, chatted with all contacts, altered orkut profile and even made an attempt to change bank account password of my classmate(which was spoiled thanks to SMS alert system the bank has) My classmate could identify the identity theft, trigger damage control initiatives and eventually was able to regain the control of gmail account but damage done in the interim period was permanent.


I am just trying to imagine what all a hacker can do if he/she manages to break into my Google account. I have a far greater presence on net than my classmate(blogger and several other Google services) and misuse can be dangerous.


While every precaution is being taken to avoid such a situation, this post is a preventive measure towards Business Continuity and aims to keep my readers informed how they can detect an identity theft.


Below are a set of Operational Policies this user(Shrinidhi Hande) will always be adhering to during his online activities. If you observe any deviation from these stated policies, it is extremely likely that something is wrong and you’re advised to proceed with extreme caution.


Continue reading at https://enidhi.net/2008/03/fyi-enidhi-india-operational-policies.html

(6)
VIEW MORE
Please fill in a comment to justify your rating for this review.
Post
Question & Answer