# What can I do in case of data misuse?

Data theft and data misuse are among the most common crimes in the digital network. Not only servers and computers, but also customer accounts can become the target of a hacker attack. If you suspect that unauthorized persons have access to your sipgate account, you can protect yourself from further data misuse in just a few steps.

{% tabs %}
{% tab title="Fritz!Box" %}
➔ Carry out a **firmware update** for your Fritz!Box. ➔ Deactivate remote maintenance.\
➔ Enter a new **password** for the web interface of your Fritz!Box.\
➔ Also change the **passwords of all services**, which you use with the Fritz!Box.\
➔ Set a new password **for your sipgate account** and transfer this to the Fritz!Box.
{% endtab %}

{% tab title="Asterisk-based system" %}
➔ **Update** your system and assign a **new password**.\
➔ Give **all extensions** a new password.\
➔ **Activate** the function **Fail2Ban***.* Further information (in English) can be found on the [Fail2Ban homepage](https://www.fail2ban.org/wiki/index.php/Main_Page).\
➔ **Renew** the **SIP passwords** in your user account and enter them in your system.\
➔ **Check** the **settings** in your **firewall**.
{% endtab %}

{% tab title="VoIP system" %}
➔ Carry out a **firmware update** of your VoIP phone.\
➔ Set a **new, secure password** for the user interface of your phone.\
➔ **Activate** You **encrypted connections** (https) in the web interface of the phone.\
➔ **Renew the SIP password** in your user account and enter it in your VoIP phone.\
➔ **Activate** You a **firewall** for your network.
{% endtab %}
{% endtabs %}

{% hint style="info" %}
Tip: To create a secure password, it is recommended to use uppercase and lowercase letters, numbers, and special characters. In addition, the password should consist of at least 12 characters. Further information can also be found on the pages of your system manufacturer or on the website of the [Federal Office for Information Security.](https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Cyber-Sicherheitslage/Methoden-der-Cyber-Kriminalitaet/Schadprogramme/schadprogramme_node.html)
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.sipgate.de/cloud-telefonanlage/en/using-sipgate/allgemeine-losungen-beim-telefonieren-mit-sipgate/was-kann-ich-bei-datenmissbrauch-tun.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
