Recovering Access After Suspicious Activity
If you believe your account has been compromised, it is critical to take immediate action for account recovery.
Follow the established steps to secure your account and restore access.
- Follow the account recovery process if you can't log in.
- Check for any unauthorized changes to your account settings.
- Contact support for assistance if needed.
Device Verification for Secure Access
Verifying devices used to access your account can help you detect unauthorized access.
Ensure that you recognize all devices listed in your account settings.
- Regularly review your device list in the BG678 portal.
- Remove any unfamiliar devices or locations from your account.
- Enable notifications for new device logins.
Monitoring and Reporting Suspicious Activity
Continuous monitoring of your account activity allows for early detection of possible fraud.
Report any suspicious activities to customer support immediately.
- Use account activity logs to track login attempts.
- Report any unauthorized transactions or security concerns through the BG678 support channel.
- Stay informed about the latest security updates and practices.