The mistake that cost me my LinkedIn account


Last month, during a two-week trip to Panama, I woke up to an email that made my stomach drop:

Your LinkedIn password has been updated.

The problem? I hadn't changed it.

My profile was wiped clean: profile photo, banner, featured section, and work history.

What followed was a week-long chore to prove my identity, recover my account, and rebuild everything from scratch.

I'm not careless with security. However, I had an old email address tied to a domain I'd let expire. Someone bought that domain and within a few days used it to take over my account.

Why Solo Entrepreneurs Are Prime Targets

Small business owners are increasingly targeted by cybercriminals. We have valuable assets like client data, payment information, and business accounts. However, we rarely have the security infrastructure larger companies use.

We're also busy. We focus on content, clients, and growth. Security feels like something we'll get to later, which is exactly what hackers count on.

Most breaches don't happen through sophisticated attacks. They happen because of small gaps: an expired domain, a reused password, or an old forgotten account.

Today, I'm sharing the five vulnerabilities that lead to most hacks.

The Five Vulnerabilities That Matter Most

1. Your Email Is Everything

Email is the master key to your digital life. If someone controls your email, they can reset passwords for other accounts.

Many use free providers like Gmail, but we need to remember that if an account gets locked or compromised, you're at the mercy of a huge customer support system that may or may not respond.

Years ago, I stopped using Gmail for sensitive communication after a specific incident. I sent a large attachment to our bank through Gmail, and within a day I was seeing ads for home refinance when I hadn’t searched for anywhere. Those ads came directly from the content of my email.

After that, I moved everything important to Proton Mail (affiliate link with discount), which I’ve used for years now. It offers end-to-end encryption and doesn’t scan your messages.

Tutanota (now branded as Tuta) is another strong option. Both allow you to use custom domains (yourname@yourwebsite.com instead of Gmail.com), which means you control the underlying infrastructure.

2. The Domain Trap

This is what cost me my LinkedIn account.

When a domain expires, anyone can purchase it. If you have accounts accessed by emails connected to that domain, the new owner can use those addresses to reset passwords and take over your accounts.

Make a list of your most important accounts: bank, social media, domain registrar, and email provider. Check which email address is tied to each one, including alternate addresses used for account recovery.

If any are tied to domains you no longer own or plan to let expire, update them immediately.

Even if you're not actively using a domain, keep it renewed if there's any chance it's connected to something important. The annual cost is minimal compared to rebuilding a hacked account.

3. Password Reality

Most people know they should use unique passwords for every account. Almost no one does because it's impossible to remember dozens of complex passwords.

That's why password managers exist. Tools like KeePassXC or Bitwarden generate strong, unique passwords and store them securely. You only need to remember one master password.

Password managers may feel like one more tool to learn, but they remove the mental load of remembering dozens of logins.

Check your email at haveibeenpwned.com to see if it's appeared in any known breaches. If it has, change the password for that account and any others where you used the same credentials.

Which one should you pick? Bitwarden is free and excellent. KeePassXC is open-source and keeps everything local on your device. Start with the one that feels simplest to set up today.

4. Two-Factor Authentication (The Right Way)

Two-factor authentication adds a second verification step when you log in. Even if someone has your password, they can't get in without that second factor.

Not all two-factor authentication is equal. SMS-based codes can be intercepted. App-based authentication using tools like Authy or Google Authenticator is more secure.

Skip SMS when you can. Use an authenticator app or, for the strongest option, a hardware key like YubiKey.

Enable two-factor authentication on your email, financial accounts, and social media first. These are the accounts that, if compromised, give someone access to everything else.

5. What You Share Publicly

Every piece of information you share online is potential ammunition for someone trying to access your accounts.

Birth dates, hometowns, pet names, and your mother's maiden name are common security questions. Photos can reveal your location or show identifying details in the background.

Be intentional about what you share and when. If you're posting travel content, wait until after you’ve left. Skip the personal trivia that could answer security questions.

Pro Tip: Most “security questions” aren’t secure. Anyone can find your personal information with a little effort. Instead, make up random answers and save them in your password manager. Treat them like extra passwords, not trivia.

Three Things to Do This Week

These three actions will close the most common vulnerabilities and take less than an hour total:

  1. Audit your email addresses. Make sure none of your critical accounts are tied to expired domains or email addresses you no longer control.
  2. Set up a password manager. Pick one tool from the list above and commit to using it. Start with your top five accounts.
  3. Enable two-factor authentication. Focus on your email and financial accounts first. Use app-based authentication rather than SMS.

Why This Actually Matters

Getting hacked isn't just an inconvenience. It's a direct threat to your ability to run your business.

We spend so much energy creating content, building audiences, and developing systems. Let's make sure we keep our online accounts secure and protect those assets.

You don't need to become a security expert. You just need to close the obvious gaps and build simple habits that protect you.

Next week, I'll cover more security wins, like how to stay safe on public Wi-Fi, protect yourself when using AI tools, and keep your primary email clean.

What about you? Have you had a close call with a hack or phishing attempt? Hit reply and share. I’d love to hear about your experience and how you resolved it.

Until next week,

Tanya

🌴 Travel Moment

Your Email Preferences:

Your email address is Reader.

Change your account details ↗

Unsubscribe from all emails ↗

Send mail to 1321 Upland Drive, Ste 11051, Houston, Texas 77043

Was this forwarded to you? Subscribe here.

Nomadic Income

Build your work-from-anywhere business so you can enjoy a life of freedom. Time Freedom - Location Freedom - Financial Freedom. Sign up here to get weekly insights on online business, AI tools, and travel adventures.

Read more from Nomadic Income
Coffee cup with heart shaped latte art in the foreground with coffee plants with green beans growing on the slopes behind it.

Last week, I didn’t send out a newsletter. I had it ready to go, but it didn’t feel right when I heard the news about Charlie Kirk. The topic of online security seemed trivial alongside the news of his death… a school shooting… a metro stabbing… and the anniversary of the September 11 attacks. In fact, it still does. So today, I want to talk about purpose. How do we live life full-out, leaving nothing in reserve? How do we serve others and leave a legacy? Purpose finds you while you are...

Skyline view of Panama City at dusk. Buildings are lit from within and lights reflect on the water of the ocean bay in the foreground.

Life is not a checklist. Deep down, each one of us knows we are the hero of our own story. Yet we often find ourselves running the same race as our peers and operating on society’s timeline. Here are a few things that help me clear away the clutter, do work that matters to me, and live the life I want. Make your bed. You know those elaborate morning routine posts? Wake up at 5 a.m., meditate for 20 minutes, journal for 10, work out, make a green smoothie, read for 30 minutes... Sigh. It...

Image shows the wing of an airplane with Guatemala City show below and mountains in the distance. There is a large expanse of blue ski and clouds on the horizon blanketing the mountains.

A few winters ago, we were skiing in Breckenridge when I noticed a boy in a beginner class on the bunny slope. Somehow, instead of properly taking a seat at the bottom, he grabbed the t-bar with one hand. Wide-eyed and panicked, he held on and screamed, "Help me!" over and over as it dragged him uphill. His instructor didn't rush to rescue him. Instead, in the most deadpan voice, she shouted back: "Let go!" That's it. The solution: let go. I think about that moment often, especially in...