Skip to main content

Suspicious activity alerts: How it works and why it matters

Learn how Suspicious Activity Alerts in Aloware notify users and admins of unusual logins to help protect accounts from unauthorized access.

Laarni D avatar
Written by Laarni D
Updated over 2 weeks ago

Suspicious activity alerts: What you need to know

Suspicious activity alerts automatically notify users and billing admins of unusual login activity, such as logins from unfamiliar locations, multiple failed login attempts, or logins from unrecognized devices. These alerts are crucial for securing Aloware by informing users of potential unauthorized access.

Examples of suspicious activity you might see

To make it easier to understand, here are a few examples of what might trigger an alert:

  1. A login attempt from a country you haven't visited recently.

  2. Multiple failed password attempts on your account within a short period.

  3. A login from an unfamiliar device or browser type.


How admins can use it

Business admins don’t need to configure anything — Suspicious Activity Alerts are enabled by default. When notified of potential unauthorized access, admins can:

  1. Review recent login activities.

  2. Verify if the access was legitimate.

  3. Contact Aloware Support for assistance if the activity looks suspicious.

This helps maintain account security and protect company data.


How users can use it

Users will receive an email if suspicious activity is detected. If the user recognizes the activity as their own, no action is required. If the activity seems unauthorized, they should report it to Aloware’s support team.


How it works with other security tools

Suspicious Activity Alerts integrate with existing security features in Aloware, complementing password protection and multi-factor authentication to maintain platform security.


Setup and configuration

No configuration is needed. Suspicious Activity Alerts are enabled by default, and notifications are automatically sent when unusual login activity is detected.

Did this answer your question?