Preventing Unauthorized Account Access

In today's digital era, the security of online accounts has never been more crucial. While Kimoby has robust security measures to prevent privacy breaches, the responsibility of safeguarding account access partly rests on your shoulders. This article offers the best practices you can implement to prevent unauthorized access to your Kimoby account.


Did you know?

Approximately 95% of all cyber-security breaches stem from human error.


Remove Users That No Longer Work at Your Store


A crucial, often overlooked aspect of maintaining the security of your Kimoby account is the timely removal of users who are no longer employed at your store. Former employees retaining access to your Kimoby account poses a significant security risk. They could potentially access sensitive information, communicate with customers under your business's name, or even make unauthorized changes.


Click here for steps on how to remove users from your account.

Use Strong and Unique Passwords


The cornerstone of account security is a strong password. Ensure your Kimoby account password is complex, combining letters, numbers, and symbols. Avoid common words or easily guessable information like birthdays. The more complex the password, the better! 

Be Aware of Phishing Attempts


Phishing scams, where attackers masquerade as legitimate entities to steal login credentials, are increasingly sophisticated. Always verify the authenticity of emails or messages that ask for your Kimoby login details. Remember, Kimoby will never ask for your password via email or text message. Consider offering training to your staff to maximize awareness of phishing scams; you are only as strong as your weakest link!

Regularly Monitor Account Activity


Stay vigilant by regularly checking your account for any unfamiliar activity, especially in Kimoby Pay. If you notice any unfamiliar activity, such as payment requests you did not create, messages you don't recall sending, or changes in your account settings, it could indicate unauthorized access.

We recommend putting in place an incident response plan and appointing a designated person of contact, so that, if a security breach occurs, it does not go unnoticed and expectations are clear.