# What do I do if I have received a verification code by email?

**Why did I receive the code by email?**

If you have received a verification code from our system by email, even though you did not log in at all, this is usually because unauthorized persons have gained possession of your login credentials.

It happens again and again that countless login credentials are stolen in large quantities by hackers from major companies such as Adobe or Dropbox (breach). If the owners of these credentials then use the same combination of email address and password with other providers, it is relatively easy for unauthorized persons to gain access to these accounts.

To prevent unauthorized persons from gaining access to sipgate customers' accounts, we send a second factor during login - the verification code. If an unauthorized person attempts to log in to someone else's account, the account owner receives the email and thus the information that there is a security risk. The unauthorized person is unable to log in to the account.

**What can I do to ensure the security of my account again?**

To restore the security of a sipgate account, it is unfortunately necessary to take a few steps. This is not particularly complicated, but it does take some time.

{% hint style="warning" %}
**Especially important: change the password of the email account**

Unfortunately, many people also use the same login details for their personal email account as they do elsewhere. To prevent unauthorized third parties from repeatedly gaining access to personal data (e.g. by resetting passwords), it is essential to first update the password of the email inbox.
{% endhint %}

**Restore account security**

If an unauthorized person has already gained access to a sipgate account, the following steps must be taken after changing the email password.

{% stepper %}
{% step %}
**Change login password**

Assign a new password for the login
{% endstep %}

{% step %}
**Renew SIP passwords**

Assign new SIP passwords for all devices in the entire account, since they can continue to be used with external devices.
{% endstep %}

{% step %}
**Check account**

Check whether changes have been made to the account (changes to email addresses or automatic top-up, newly booked contracts, or newly created users).
{% endstep %}
{% endstepper %}

**What is the goal behind logging into other people's accounts?**

The goals behind unauthorized logins to other people's accounts are varied. Most often, the aim is to generate revenue shares by making as many calls as possible to expensive foreign numbers.

**How do I best secure my sipgate access?**

{% hint style="info" %}
In the user settings, you can activate two-factor authentication. This provides even more security and is strongly recommended by us.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.sipgate.de/cloud-telefonanlage/en/account-management/login/was-mache-ich-wenn-ich-einen-verifizierungscode-per-e-mail-erhalten-habe-obwohl.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
