I always sympathize when I hear about hackers breaking into someone’s computer. I felt terrible when Phillis from Orlando Beach, FL called the show and said hackers had stolen $150,000 from her brother’s PC. If you’ve ever been hacked, you know how scary it is.
That’s why I put it together. Hacking Survival Guide If you are unlucky enough to be a victim of this cybercrime, follow this seven-step checklist.
1. Change all passwords.
Update all your passwords — especially your email and financial accounts. Every password you keep is a potential entry point for a hacker.
Here are five ways to create strong passwords:
- Make them longer than 14 characters: More is better, but be aware of character limits.
- Use a mix of upper and lower case letters.: Mix them up to make your password more complex.
- Throw in the numbers.: Avoid date of birth. They are very easy to detect.
- Don’t forget the symbols: Insert asterisks, parentheses, exclamation marks, commas, question marks and anything else you can think of.
- Make it a passphrase: Use something like, “I went to the spa and saw the moon.” Replace some letters with numbers and symbols.
Remember to use a unique password for each online account. It can be difficult to remember them all. Password manager Can help you keep track of your changes.
2. Enable two-factor authentication (2FA) after you’ve been hacked.
2FA verifies your identity every time you log in. For example, when you try to access your online banking account, you’ll need to enter your credentials and a security code sent via text. Type the code into your device to prove your identity.
Unfortunately, some hackers can intercept 2FA texts. That’s why I recommend authentic apps.. They only provide one-time codes that refresh every 30 seconds. Because they are time-sensitive, they are more difficult for hackers to exploit. Whenever an account gives you the option to connect an authenticator app, take it.
3. Install antivirus software.
After you’ve been hacked, you must go above and beyond to thwart future cyberattacks. But you don’t have time to find all the threats like viruses and malware. Let the antivirus program do the work for you.
Get more technical information »Kim Commando ShowAired on 425 plus radio stations and available as a The podcast. Sign up for Kim’s free 5-minute morning roundup. For the latest security breaches and tech news. Need help? Leave your question for Kim. Here.
4. Be careful with emails and links
You should always be careful when opening emails from people you don’t know. Take extra precautions after hackers break into your computer. Cybercriminals have already leaked your private information on the dark web.
remember: Never click on random links. They can install harmful malware on your devices. Also, don’t open attachments unless you expect them from friends, family members, or coworkers. Phishing emails often come with malicious files..
5. Back up important data after being hacked.
After a hack attack, you’re especially vulnerable to ransomware. This happens when hackers inject a virus into your phone or computer that locks down data. Just like that, you can’t access your files unless you pay an expensive ransom. Paying the ransom also does not guarantee that they will return your files to you. They are criminals, after all.
Back up your important data at least once a week. Otherwise, you can Permanently lose your emails.spreadsheets, passwords, photos, videos and other important files.
6. Do a full factory reset.
A hacker might have installed secret programs on your device. A complete factory reset will eliminate harmful bugs in your system. But as we explained in step five, you should back up your computer first.
To reset a Windows computer, follow these steps:
- go to Get started. > Setting > Update and security.
- From there, select Recovery > Reset this PC > Start..
- go to Keep my files And choose Cloud or Local.
- Set Restore previously installed apps? To no.
To reset the Mac, do this:
- Select the Apple menu in the corner of your screen.
- go to System Settings > General.
- select Transfer or Reset. on the right.
- Then, click Erase all content and settings..
7. File a complaint on ic3.gov after being hacked.
The Internet Crime Complaint Center — or IC3 for short — can help prevent the hacker who targeted you from going after someone else.
Read full article here