Call IDCARE
AU: 1300 432 273   or   NZ: 0800 201 415
Get Help Now
Get Help
Report Phishing
Report phishing
Incident Response
Incident Response
AU: 1800 595 160  or  NZ: 0800 121 068
Get Help
Cyber Resilience Outreach Clinics
C.R.O.C
IDCARE - Australia and New Zealand’s national identity and cyber support service.
GET HELP
SUPPORT SERVICES
SUPPORT SERVICES
FOR INDIVIDUALSFOR SMALL BUSINESS & SOLE TRADERSFOR OTHER ORGANISATIONS
LEARNING CENTRE
LEARNING CENTREFACT SHEETSVIDEOSAPPS AND TOOLSNEWS AND MEDIA
ABOUT IDCARE
WHAT IS IDCARE?STAY SMART ONLINE WEEKMEET THE TEAMNEWS AND MEDIAC.R.O.COUR SUBSCRIBER ORGANISATIONSPOLICIES AND DOCUMENTSCURRENT VACANCIES
CONTACT USC.R.O.CDASHBOARDLOG INLOGOUT

Email Recommendations

IDCARE's Learning Centre
Learning Centre
Fact Sheets
All Fact SheetsCredit Reporting AgenciesDevices & Technology
Credentials &Identity FraudScam Prevention & EducationEngaging OrganisationsSocial Media
Your Rights
How to Videos
All VideosScam Prevention & EducationDevices & TechnologySocial MediaYour RightsTips for BusinessIDCARE
Apps & Tools
Cyber First Aid Kit
Social Media
FacebookTwitterYouTubeInstagram
Contact IDCARE
Get Help General EnquirySubscriber Enquiry
Email takeover or access is one of the most common forms of identity compromise.

Email takeover or access is one of the most common forms of identity compromise.

Email Detection Tips

Check your email accounts to ensure they are secure. Specifically check there are no ‘unknown’ email addresses attached to your account.

Yahoo Mail Tips

Yahoo Mail Tips

Outlook/Hotmail Tips

Outlook/Hotmail Tips

Gmail Tips

Gmail Tips

Email Recommendations

Email takeover or access is one of the most common forms of identity compromise. Our email accounts hold a great deal of information about us and criminals are very motivated to sift through them to find what they are looking for. Primarily they are looking for key documents such as driver licence, passport, Medicare, TFN etc. Once they have gathered this data they have the ability to apply for new accounts and lines of credit in your name. Furthermore once a criminal has gained access to your email they have the ability to redirect mail, send and delete emails and impersonate the email recipient.

For email provider specific advice please select the correct option below. If you do not see your email provider listed here, you can select the general tips to detect and prevent misuse of an email account. 

‍

  • General
  • Yahoo Mail
  • Outlook / Hotmail
  • Gmail

‍

‍

BACK TO eMAIL RECOMMENDATIONS