Blog | G5 Cyber Security

Abuse/Attack Notification Email

TL;DR

This guide shows you how to create a clear and effective email template for notifying users about potential attacks or abuse on their accounts. It covers essential information, steps to take, and resources for help.

Creating an Effective Abuse/Attack Notification Email

  1. Subject Line: Keep it concise and alarming but not overly sensational. Examples:
    • “Security Alert: Unusual Activity on Your Account”
    • “Important: Potential Compromise of Your Account”
    • “Action Required: Suspicious Login Attempt”
  2. Greeting: Personalize the email with the user’s name. Example: “Dear [User Name],”
  3. Explain the Issue (Clearly): State what happened in plain language.
    We have detected unusual activity on your account that suggests it may have been compromised. Specifically, we noticed a login from an unfamiliar location/device at [Date and Time].
  4. Details of the Activity: Provide specific details without overwhelming the user.
    • IP Address (if available): “The login attempt originated from IP address [IP Address].”
    • Location (approximate): “This location is in [City, Country].”
    • Device/Browser: “The login was attempted using a [Browser] on a [Device Type].”
    • Time of Activity: “This activity occurred on [Date and Time].”
  5. What the User Needs to Do (Step-by-Step): This is the most important part. Provide clear, actionable steps.
    1. Change Your Password: “Immediately change your password using a strong, unique password.” Include a direct link to the password reset page.
      Reset Your Password
    2. Review Account Activity: “Check your recent account activity for any unauthorized transactions or changes. Look for anything you don’t recognize.” Link to the account history page.
      View Your Account Activity
    3. Enable Two-Factor Authentication (2FA): “If you haven’t already, enable two-factor authentication for an extra layer of security.” Link to the 2FA setup page.
      Enable Two-Factor Authentication
    4. Report Suspicious Activity: “If you see anything suspicious, please contact us immediately at [Support Email Address] or call us at [Phone Number].”
  6. Security Resources & Information: Provide links to helpful resources.
    • Password Security Tips: Link to a guide on creating strong passwords.
    • Phishing Awareness: Link to information about phishing scams.
    • cyber security Best Practices: Link to general cyber security advice.
  7. Contact Information: Include clear contact details for support.
    If you have any questions or need assistance, please don't hesitate to contact our support team at [Support Email Address] or call us at [Phone Number].
  8. Closing: Acknowledge the seriousness of the situation and offer reassurance.
    We take the security of your account very seriously. We are here to help you resolve this issue quickly and securely.
  9. Example Email Snippet (HTML):
    <p>Dear [User Name],</p>
    <p>We have detected unusual activity on your account that suggests it may have been compromised. Specifically, we noticed a login from an unfamiliar location at [Date and Time].</p>
    <p>Please change your password immediately: <a href="[Password Reset Link]">Reset Your Password</a></p>
Exit mobile version