EA Forums Online Security Newsletter - Volume 6
Before we begin this issue’s regular sections, we want to thank everyone who participated in the discussion in the previous edition. Your shared experiences and kind words of appreciation mean a lot to us. 🥰 In this issue, we’ll again examine phishing methods from a psychological perspective, exploring why they are so effective and how we can better protect ourselves. Phishing isn't just about dodgy links; it's about exploiting fundamental human tendencies. Scammers are master manipulators, playing on our emotions, our desire for efficiency, and even our inherent trust. When you understand the psychological levers they pull, you gain a powerful advantage in spotting and avoiding their traps. 🤓 If you missed the previous edition, you can find it [here]. As always, joining the discussion or solving the quiz will earn you a token of participation in the form of a unique badge on the forum. 🤠 Stay safe! The Psychology of Phishing The Lure of Urgency and Scarcity, aka Fear of Missing Out Phishers often create a sense of immediate crisis or limited-time opportunity (e.g., "Your account will be suspended in 24 hours!" or "Exclusive limited-time skin unlock!"). This triggers our primal fight-or-flight response, bypassing rational thought and pushing us to act without deliberation. The fear of loss (of access, of a rare item) is a powerful motivator. When you feel a sudden surge of urgency or excitement from an unexpected message, stop and take a deep breath. A legitimate service will rarely demand immediate action without prior warning. Verify independently through official channels, not by clicking links in the suspicious message. Authority Bias Humans are conditioned to respect and obey authority figures. Phishers expertly mimic legitimate sources like game developers, platform support, or even government agencies. The use of familiar logos, official-sounding language, and seemingly authentic sender addresses exploits our tendency to trust perceived authority without question. Never assume legitimacy based solely on appearance. Always cross-reference. If you receive an unexpected email from "EA Support," don't click a link in the email. Instead, open your browser and manually navigate to EA's official support website to log in or check your account. The "Intriguing Mystery" Phishing Our brains are wired to seek out novelty and resolve unknowns. Phishers exploit this by sending messages that pique our curiosity (e.g., "See who's talking about you!" or "Your private photo has been leaked!"). The desire to know, to uncover the "secret," overrides caution, leading us to click. Before clicking on anything that triggers intense curiosity, engage your critical thinking. Is this too good to be true? Does it make sense that I would receive this message? If it sounds sensational or unbelievable, it likely is. Reward Phishing We often feel a subconscious obligation to repay a favor or respond positively to someone who has given us something. Phishers leverage this by offering enticing "rewards," "freebies," or "exclusive access" (e.g., "Claim your free legendary loot box!"). The desire to accept the perceived gift can blind us to the underlying danger. While it's nice to receive gifts, be highly suspicious of unsolicited windfalls, especially those requiring you to click a link or provide personal information. Legitimate giveaways from reputable companies will always direct you to their official website or have a clear, secure claiming process. If you didn't enter a contest, you didn't win. The "Everyone is doing it" Phishing Humans are social creatures, and we often look to the actions of others to determine what is correct or safe. Phishers can create a false sense of social proof by impersonating friends, guildmates, or popular streamers, often sending messages like "Hey, check out this amazing new game!" or "I just got this awesome item using this link, you should too!" This can lead us to believe that if others are clicking, it must be safe. Even if a message appears to come from a trusted friend, consider the context and how they usually communicate. If it seems out of character, or if the link is suspicious, contact your friend through a separate, verified channel (e.g., a direct message on a platform you know is secure, or even a quick call) to confirm. Stay vigilant! Pause, verify, and think critically before clicking on unexpected links or acting on urgent messages—protect yourself from phishing scams! How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challenge Creation Interest Form Online Security Newsletter - Volume 6 Quiz382Views14likes18CommentsEA Forums Online Security Newsletter - Volume 5
Welcome to all our readers - whether you're a long-time subscriber or joining us for the first time—for the latest edition of our newsletter! This month, we invite you to engage in a conversation about security, our featured topic, and much more. Each edition is an opportunity to share your security tips, experiences, or insights with us. In last month’s edition, we explored the critical topic of safe online transactions. With the summer promotions season fast approaching, now is the perfect time to refresh your knowledge or check out our tips if you haven’t already. We also introduced the latest updates to EA’s flagship anti-cheat system, EA Javelin. If you’re unfamiliar with EA Javelin, we encourage you to revisit last month’s newsletter to learn more. This month, we’re exploring the fascinating topic of passwords from a psychological perspective. Why do we choose certain passwords over others? What motivates our choices? And what strategies can help you create strong, secure passwords? You’ll find answers to these questions and more in the Security Focus section. As always, your participation in the newsletter—whether through comments, quizzes, or sharing your experiences—earns you a participation token: a unique badge on the forum. Don’t miss out! We would also like to highlight recent software blocks in EA Javelin. AntiCheatWard from EA's anti-cheat team shared that the Disc-Soft block was implemented due to cheat-like scripts circulating in the ReWASD community, which automate actions like recoil control and skill-based challenges in games. While EA Javelin Anticheat supports legitimate remapping tools like Steam Input and Microsoft's Keyboard Manager, Disc-Soft's attempts to bypass anti-cheat checks and its tolerance of these scripts led to blocking their virtual hardware and drivers. We encourage you to uninstall the software and provide feedback to the vendor, with hopes that changes in their practices could allow for more targeted blocks in the future. You'll find the link to the full article in the InfoHub Section. Stay safe! The Psychology of Password Creation In today's digital age, passwords are crucial for safeguarding our personal and professional information. Yet many people struggle with creating and remembering secure passwords. This challenge is deeply rooted in human psychology and impacts how we choose and manage our passwords. Cognitive Load and Memory It is human nature to simplify complex tasks, which leads to choosing passwords that are easy to remember. As a result, simple choices can be made, such as using sequential numbers, common words, or birthdays. These elements reduce cognitive load, but at the same time, they compromise security. Familiarity Bias People tend to choose passwords that are familiar or meaningful to them. It can be the names of loved ones, favourite sports teams, or phrases that are familiar to you. While these choices make passwords easier to remember, they also make them easier to guess. Risk Perception Many users underestimate the risk of cyber threats, believing that they are unlikely targets. This perception leads to less rigorous password practices, such as using the same password across multiple accounts or opting for simple, easily cracked passwords. The Role of Emotion Emotional attachment can play a significant role in password creation. People often choose passwords that evoke positive feelings or memories, which makes them easier to recall. However, emotional passwords can be predictable for anyone familiar with the user. Social Influence Social factors, such as advice from friends or media, can impact password choices. Recommendations to use complex passwords might be acknowledged but not always implemented due to the inconvenience of remembering them. Strategies for Improvement Use Passphrases Combining unrelated words into a passphrase increases complexity while remaining memorable. Leverage Mnemonics Creating a mnemonic device can help recall complex passwords. Employ Password Managers These tools reduce the burden of remembering multiple passwords while ensuring they are strong and unique. Periodic Password Updates Changing passwords can mitigate risks associated with compromised credentials. But don't make it a burden, as accourding to NIST research over complicating the password changing process might have opposite effect. Online Security Newsletter - Feedback Form Online Security Newsletter - Challenge Creation Interest Form EA Javelin Anticheat & Recent Software Blocks Online Security Newsletter - Volume 5 Quiz540Views13likes16CommentsEA Forums Online Security Newsletter - Volume 4
Hello everyone, Welcome to Issue #4, where we will cover the topic of secure online transactions. Before we dive into this month’s topic, let’s take a look back at last month’s topic—biometrics and passkeys. Both are essential security features that can make your online life more secure. Be sure to check out last month’s blog post [here]. 😊 This month, we will also explore EA's flagship anti-cheat software, EA Javelin. Whether the name rings a bell or it's new to you, head to the InfoHub section to learn more about its evolution. 💡 As always, whether you interact with this newsletter by sharing your experiences or testing your knowledge through our quiz, you’ll receive a token of participation, a unique forum badge that can only be obtained this way! Stay safe! Secure online transactions Stick to official stores and trusted sellers Avoid buying games from unverified sources. The best way to ensure authenticity is to purchase directly from the publisher’s website, which may sometimes redirect you to verified partners. For example, if you see a game being sold at an unusually low price on an unfamiliar website, it’s likely a scam or counterfeit product. Always prioritize trusted sources to avoid compromising your account or device. Buy game currency directly in the game or through trusted sellers Some games offer additional in-game currency. The safest way to obtain it is through the game itself. In some cases, you may also purchase currency from trusted sellers, but always verify their legitimacy. Be cautious of websites or sellers offering discounts on in-game currency that seem too good to be true. These could be phishing attempts or fraudulent transactions that put your account at risk. Enable Two-Factor Authentication (TFA) This is one of the most commonly recommended tips for online safety, and for good reason. If you haven’t set up TFA yet, do it now! It’s the best way to secure your account against various types of attacks. TFA works by requiring two forms of verification, such as a password and a code sent to your phone, making it significantly harder for attackers to gain access to your account. To learn how to enable TFA on your EA account, check out this article. Use dedicated payment methods Whenever possible, use dedicated payment methods like PayPal, Google Pay, or similar services. These provide an additional layer of protection for your transactions. For instance, if your payment information is compromised, services like PayPal often offer buyer protection and dispute resolution, which can help safeguard your funds. Keep your system up to date Those annoying system update or antivirus pop-ups that appear on your screen from time to time—don’t ignore them. Keeping your systems up to date is one of the best ways to strengthen your security and protect against vulnerabilities. Updates often include patches for newly discovered security flaws, so delaying them could leave your system exposed to malware or hacking attempts. Be aware of social engineering Before clicking on any link, verify its authenticity! If a link looks suspicious, take a step back and find another way to access the site you’re looking for. For example, if you receive an email claiming to be from EA with a link to reset your password, always check the sender’s email address and navigate to the official EA website directly instead of clicking the link. Be cautious of fake support chats. EA support representatives will never contact you via PSN/Xbox chat or Discord. Buying EA games: order and payment info View your EA order history and status How to use Ultimate Team™ Coins and EA SPORTS FC™ Points safely Where to buy EA digital download games and virtual currency How to buy a game on EA.com | EA Help | YouTube What is EA Javelin Anticheat? EA Javelin Anticheat is EA’s advanced security system, launched in 2022, designed to prevent, detect, and block cheating across 14 EA titles, including Battlefield™, Madden NFL™, and EA SPORTS FC™. It reinforces fair play while balancing player privacy and system integrity. Why was the name "Javelin" chosen? The name symbolizes defense, strength, and agility, reflecting the mission to protect fair play and uphold the integrity of EA’s gaming experiences. How effective has EA Javelin Anticheat been so far? Since launch, it has supported over 28 million PC players across 2.2 billion gaming sessions, maintaining an impressive accuracy rate of over 99% in preventing cheating attempts. Recent improvements cut Battlefield 2042’s Match Infection Rate (how often regular players encounter cheaters) by about 50%. Why does EA Javelin use kernel-level protection? Kernel-level access is necessary to detect sophisticated cheats operating deep within the system. EA Javelin only runs when EA games are active and respects player privacy, validated by internal and third-party assessments. What are EA’s future plans for anticheat and security? We will continue to invest in new tools, technologies, and robust security measures to stay ahead of threats and ensure that player experiences remain safe, fair, and fun Want to know more and read full articles? Introducing EA Javelin Anticheat Fighting for Fairness: Anti-Cheat Progress Report Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 4 Quiz552Views17likes9CommentsAHQ Archive: Online Security Newsletter - April 2024
Hello everyone! Welcome to the sixth edition of the Answers HQ Online Security Newsletter! Can you believe it's already been six months since we launched our first newsletter issue?😮 I'd like to take this opportunity I would like to thank all regular participants, as well as welcome new ones and encourage everyone to share their thoughts related to the topic of this issue. Last month, we explored the importance of having complex and unique passwords. We also highlighted the most frequent errors made when creating or entering passwords. If you wish to review previous releases, you'll find a list to all previous editions at the bottom of this post. 😊 For this issue, we'll concentrate on topic closely related to online gaming - specifically, streaming gameplay. We will also think about the precautions you can take to ensure your online safety isn't compromised. If you are a streamer, you are more than welcome to share a link to your streaming platform profile! However, please refrain from providing profiles to gain monetary value. As usual if you participate in the newsletter by joining the conversation, solve the challenge or take the quiz you'll receive an unique badge to your forum badge collection! Security focus - Stream(er) Safety Threat of doxxing to online Streamers; What is doxxing? Doxxing poses a significant risk to unsuspecting streamers. It involves unauthorized public disclosure of personal information. Those might be possessed through social media, or through social engineering. The individual publishing such data often aims to embarrass, harm, or online-shame the victim victim by revealing potentially shocking information. Mind your digital footprint While streaming, it's important to be mindful of both what you're saying and what you're displaying. Remember, your stream could be recorded and later used to extract your private information. Make sure not to disclose details that could reveal your location or address. If your correct location is mentioned by someone during the stream, remain calm and refrain from confirming the accuracy of the information. Create a Safe Streaming Environment This includes your computer - ensure that your desktop or browser doesn't display any information that could be personally identifiable. Additionally, keep an eye on what's visible in the camera's view like windows, mirrors, doors, or a pin board with memos. Secure your accounts and use privacy features Whenever possible, use Two-Factor Authentication (TFA) or Multi-Factor Authentication (MFA), and create unique, strong passwords. It is crucial to create separate PC account, email address just for the stream purposes, and any other social media platform accounts which are not associated with your own private account. Check the privacy features on the streaming platforms and adjust them to your preference. Never mention your real name in in the chat. Use moderation tools, or ask someone to look after your stream as a moderator In addition to securing your personal information and creating a safe environment, it's also essential to have control over what's happening during your live streams. Utilize the moderation tools provided by the platform to manage comments and engagement. These tools allow you to filter out inappropriate comments, block users, or chat to certain users. You might also consider asking trusted person to act as a moderator on your streams. Having extra pair of eyes (and hands 😉) and ensure that the conversations remains respectful and safe. When it comes to moderation don't allow to use links in the chat, as they are usually used for phishing attacks. Never share your stream key A stream key is a unique string of characters that allows programs to stream your gameplay directly to the platform. If someone possesses your stream key, it might lead to a takeover of your stream. A person in possession of your stream key could, without your account details, stream as you! What to Do if You’re Being Doxed - an Interview with Eva Galperin, the director of cybersecurity at the Electronic Frontier Foundation Answers HQ Online Security Newsletter - April Maze Challenges Over the course of the month, we'll release 3 Maze challenges. Each of them will hold different questions, but they will all stay within the theme of this month's topic. Guide for the Challenge: Your task is to answer 10 questions. Note down the questions you have already answered. Pick the question you want to start from (it doesn't have to be question 1). After choosing the correct statement, note down the characters marked in blue next to the answer you have chosen. Proceed to the question whose number is next to #58Views0likes1CommentEA Forums Online Security Newsletter - Volume 3
Hello everyone, 👋 Welcome to Volume 3 of the EA Forums Online Security Newsletter!🎉 Number 3 is special in the cybersecurity field, so we can treat this edition as quite special. Why is the number 3 special, you ask? There are many different approaches in cybersecurity that address fundamental aspects. Make your own research and let us know your findings!🧐 Speaking of fundamentals, last month we covered the basics of online safety. It’s a reminder not to overlook the most crucial aspects of your online life! If you missed Volume 2 or need a refresher, the link is here. This month we’ll cover the interesting topics of biometrics, passkeys, and the passwordless approach to online safety. As always, by interacting with the newsletter through participating in the quiz or sharing your experiences in the comments, you’ll receive a unique forum badge! Stay safe! What is biometrics? Biometric authentication uses your biological traits—fingerprint, face, or voice—to verify your identity. OK, and passkeys? Passkeys are cryptographic keys stored on your device, removing the need for traditional passwords entirely. Why should I care? Both biometrics and passkeys provide a seamless and secure way to log in, eliminating weak passwords susceptible to cracking, phishing risks, and brute force attacks. What are other benefits of biometrics and passkeys? First, there is no need to type your password anymore, nor use additional TFA. Another significant benefit is hardened phishing resistance. Even if someone gets hold of your password, they can't steal your fingerprint. Additionally, biometric data can't be guessed or cracked through brute force attacks. Alright, but what if someone gets my device? Biometric data is encrypted and stored securely on your device, not in a central database. Even if a hacker accesses your device, they won’t be able to extract your biometric information. Does my device keep a record of my fingerprint? Your device keeps a biometric value of your fingerprint, face, or voice, which is then encrypted. Your device does not store your actual fingerprint or photo of your face (apart from your photo reel). FIDO Alliance - industry standards for passwordless authentication NIST - Biometric security Electronic Frontier Foundation - Digital privacy Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 3 Quiz475Views15likes11CommentsEA Forums Online Security Newsletter - September
Our newsletter is always published at the end of each month to discuss the previous month's security news. However, we’re excited to highlight that October is Cybersecurity Awareness Month. During October, you have the opportunity to earn a badge* (on AHQ) on the forum not only by participating in this newsletter but also by engaging in discussions and quizzes related to cybersecurity. At the start of each week, we’ll publish an article dedicated to online security on the forum! In the previous issue, we touched on the topic of securing our home network and how to protect ourselves from danger. Many valuable comments and tips appeared in the discussion. If you haven't had the opportunity to read the previous issue, be sure to check it outhere This month, the topic of our "Security Focus" will be bots. You will learn what bots are and whether bots are always good or bad. The topic of bots is very interesting, you can find out more in "Security Focus." As always, by joining the discussion or solving the quiz, you will receive a participation token - a unique badge on the forum! We would love to hear your feedback. Visit the Feedback Hub to share your thoughts about the newsletter, ask questions, or share your inspiring stories. If you're interested in hosting next month's challenge, you can also submit your application through the Feedback Hub. Your input helps us improve and keeps our community engaged! Without further delay, let's get started! Bots Bots definition A bot is basically an app that can do tasks on its own without needing someone to start it every time. They handle repetitive tasks way faster than humans. Not all bots are bad, but some are designed to cause trouble or benefit their creators at the expense of others. When multiple bots team up, they form a botnet, which can be used to launch attacks. How do they work? Bots run on algorithms that help them do their specific jobs, like chatting with people to seem human or gathering info from websites. There are many types of bots, each made to handle different kinds of tasks. Examples of good bots Search Engine Crawlers: Bots like Googlebot that index web content to make it searchable. Chatbots: Bots that provide customer service or support by interacting with users in real-time. Monitoring Bots: Bots that track website performance, uptime, and security. Examples of bad bots Spambots: Bots that distribute spam content or advertisements. Scraping Bots: Bots that harvest data from websites without permission. DDoS Bots: Bots that participate in Distributed Denial of Service attacks to overwhelm and shut down websites. How to protect yourself from bad bots? Ensure your passwords are strong and unique to protect against brute force attacks, and enable Two-Factor Authentication (TFA) to add an extra layer of security that bots find difficult to bypass. Guard your privacy by keeping personal information confidential, as sharing details recklessly can make you an easy target for bots that harvest data for malicious purposes. Download files only from trusted sources to avoid malicious software that can turn your device into a bot, unknowingly participating in attacks. Regularly update your operating system and antivirus software to patch vulnerabilities that bots exploit to gain unauthorized access. Keep your home network secure by updating your router's firmware, as outdated routers can be hijacked by bots to form part of a botnet. Stay alert to phishing attacks, as bots often use these to trick you into revealing sensitive information, leading to compromised accounts and systems. What Is A Bot? How Do Bots Work? What is a Googlebot? Botnet - NIST glossary Answers HQ Online Security Newsletter Feedback form (including Community Spotlight, and Q&A submissi... Answers HQ Online Security Newsletter - Challenge Creation Interest form EA Forums Online Security Newsletter - September Quiz144Views2likes5CommentsEA Forums Online Security Newsletter - Volume 2
Hey everyone, welcome to the second edition of our newsletter dedicated to online safety for gamers. Last month, we examined security measures designed to protect us from malicious programs that can appear when we are not careful when using our phones, tablets, and computers. We also looked at this topic from the perspective of protecting the youngest from the dangers lurking online. If you have not yet had time to read the previous edition, you can find the link here. In this edition, we want to remind you of the basic rules of security for your online account, which you use for games and more! As always, for participating in the newsletter, whether by sharing your experiences with us or by completing the quiz, you will receive a participation token - a unique badge on the forum. Stay safe! Basic rules of security for your online account. Strong, Unique Passwords Think of your password as the key to your digital vault. A strong password is long, complex, and unique. It should mix uppercase and lowercase letters, numbers, and symbols. Use hard-to-guess information instead of common choices such as "123456" or "password," and avoid words that are easy to guess, such as birthdays and names like "Daniel93." However, remembering numerous complex passwords can be daunting. You can store your passwords securely, and they'll fill in automatically with password managers. Using them, you can generate strong passwords and prevent using the same password twice. Two-Factor Authentication (TFA) Two-Factor Authentication adds an extra layer of security by requiring a second form of verification. Google Authenticator is a popular choice that generates time-based codes, ensuring only you can access your accounts. Google Authenticator and other apps now support seamless device integration and offer biometric options, making 2FA quicker and more secure. Guarding Against Phishing Phishing is a deceptive attempt to steal your data. Always verify the sender's email address and look for typos, grammatical errors, or suspicious links. Use multi-factor authentication for extra security. Keep software updated and employ strong, unique passwords. Be cautious with attachments and never share personal information. Trust your instincts; if it feels off, it probably is. Securing Your Email Your email is a gateway to many of your accounts. Enable two-factor authentication for your email, and regularly review your account activity. Use encryption tools for sensitive communications and be wary of unsolicited requests for personal information. Many companies partner to ensure the highest level of security. You can read about EA's cooperation with Google in our news section "Keeping your EA account safe by working with others." This partnership addresses cases where email accounts tied to EA Accounts were compromised, allowing attackers to take over the EA Account and other valuable internet accounts connected to that email. EA has been working closely with Google to address this quickly and safely through their Cross-Account Protection program. Google shared more about this partnership in a recent post here! How to turn on EA Login Verification Where can I find my backup codes? How to update your EA Account Positive Play Charter Report cheating, harassment, and illegal content How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 2 Quiz443Views15likes17CommentsEA Forums Online Security Newsletter - Volume 1
We're starting the year with a few changes to adapt to the transfer to the new forums. You'll notice a slight change in the naming of the newsletter and the badges. The newsletter will now be released in volumes every month. As usual - you can still receive badges for participating in volumes 1-12. I want to dedicate this month's subject to my nephew, who inspired me by asking some questions that intrigue him a lot—he just got his first PC and has many questions. So, let's start with the basics and answer one of his many questions: How do you download games safely? Let's consider why this is so important. Before diving into the world of games, everyone needs to download them first—and there's a right and wrong way to do this first step. The right way is safe for both the user and their device. Knowing a few simple rules can help us avoid problems and enjoy games stress-free. Those rules are especially crucial for young gamers and inexperienced parents, as it's easy to stumble upon unsafe sources or harmful apps. But I believe that even more experienced users can refresh or even update the "database". I'll share some tips and real-life examples that might be helpful. Don't forget to check them out and talk with your daughters, sons, nephews, nieces, grandparents, and parents. Okay, let's say it in a simple way: It will benefit everybody. How do you download games and applications safely? Download only from trusted sources Always download apps and games from official stores, such as Google Play, the App Store, or the Microsoft Store. Unknown sources may offer infected files that can harm your device. Check reviews and ratings Before downloading a new app, it's a good idea to read other users' reviews and check ratings. Apps with lots of positive reviews are usually more trustworthy. Beware of app permissions Before you install a new app, check what permissions are required. If a flashlight app wants access to your contacts and messages, it may be suspicious. Keep your apps and operating system up to date. Use antivirus software Installing antivirus software on your device can help detect and remove malware. Beware of "Cracked" versions Downloading “cracked” versions of games and applications is illegal and very risky. Such files often contain viruses and other malware. By following these tips, you can enjoy your favorite apps and games without worry! Stay safe and have fun! How to turn on EA Login Verification Where can I find my backup codes? How to update your EA Account Positive Play Charter Report cheating, harassment, and illegal content How to avoid phishing Online Security Newsletter - Feedback Form Online Security Newsletter - Challange Creation Interest form Online Security Newsletter - Volume 1 Quiz433Views18likes14CommentsAHQ Archive: Online Security Newsletter - June 2024
Welcome, to new issue of our Answers HQ Online Security Newsletter! In the last issue, we explored the dangers of malware, how to recognize its signs, and most importantly, how to eliminate it. This month, we're focusing on securing your account with our tips brought to you by @EA_Kalina! While these tips are tailored for your EA account, they are also apply for safeguarding all your other accounts. Make sure to implement them after you finish reading our newsletter! As always, each participant of our newsletter will receive a unique badge on the forum. Join the discussion, solve the quiz, or participate in the challenge to showcase your achievement! Speaking of challenges ... We're thrilled to invite you to create challenges for our future newsletters! Want to test your skills and contribute? Fill out this form to get started. This month's challenges are brought to you by a regular contributor, @ElliotLH! Security focus - Account Security SECURE YOUR ACCOUNT IN 6 STEPS Securing your account is crucial for maintaining the integrity of your online gaming experience. Here are the six steps to ensure your account remains safe: Make sure you apply them after reading this guide! Password A password is a secret word or phrase that you use to log into your account. A password is a secret that only you know. Don't share it with anyone, not even your best friend. What should be the password? Strong: Use a combination of letters (upper and lower case), numbers and symbols. Unique: Don't use the same password on different accounts. Instead of "password123," use "S3cuR3P@$$w0rD!" Two-Factor Verification (TFA) Two-factor verification is an additional layer of security that requires more than just a password to log in. After you enter your password, you must also enter a code that is sent to your phone or email. - Why is it important? - Two-step Verification protects your account, even if someone knows your password. Using the app authenticator for Login Verification is the safest way to keep your account secure. Here’s how to set it up. Trusted Devices Trusted devices are those that you regularly use to log into your account. Trusted devices are saved in your account, so you do not have to go through additional verifications each time. - Why it's important? - It helps you log into your account faster and more securely. Be careful where you play Don't log into your account on public computers or in unknown places. Public computers can be infected with viruses that can steal your data. If you are playing on a friend's computer, be sure to log out of your account after the session is over. Your profile, account security, and games are all accessible when you leave your account logged in. Backup e-mail A backup email is an additional email address that you can add to your account as a security measure. If you can't get into your main email account, you can use the backup email to regain access. Don't share information Don't give out your password, personal information or other sensitive information to anyone, even friends. Sharing this information can lead to account theft and other dangers. By following these steps, you can significantly enhance the security of your account and enjoy a worry-free gaming experience. How to turn on EA Login Verification Where can I find my backup codes? How to update your EA Account Answers HQ Online Security Newsletter Quiz - June97Views1like1Comment