Site icon YourLifeChoices

I’ve been hacked. What now?

A recent spate of ransomware and malware attacks have prompted a few of our members to ask what they should do if they discover that they’ve been hacked.

It’s not difficult to become the victim of malware or other insidious computer viruses. All you have to do is open the wrong email, or an attachment in what looks to be an innocent email, download a nasty file, or fill in your details on an unassuming looking website and, bang, you’re infected.

So, what action should you take to minimise the damage and avoid passing it on to others? Here’s the quick and dirty DIY post-hack manual.

1. Unplug your computer
Pull out your power cord and unplug all of your computer cables. Deactivate your wifi and Bluetooth connections. Switch off your computer. Turn off your modem.

2. Report the hack
You may get some good advice from professionals who have dealt with the specific attack you have suffered.

3. Restart your computer (and we mean start afresh)
If you’ve been hacked, it’s probably best to say goodbye to the contents of your hard drive. Erasing the contents of your drive and restoring to factory settings is the closest you’ll get to a clean start, so here’s how to do it:

Windows 10

 

Windows 8

 

Mac

 

Now, that should sort out your problem. Prior to doing this, you could try scanning for viruses and malware using anti-virus software, but restoring your computer to factory settings is the best way to guarantee a fresh start. If you have any concerns, it’s best to speak to an IT professional.

Hopefully, you’ve backed up your files. If so, you can now transfer them over to your new hard drive.

Now, to protect yourself from future attacks:

 

Following these procedures is the best way to stay ahead of hackers and cybercriminals. Not updating your operating system is akin to leaving your windows open and going out for the day. You may return to an intact house, or you could be robbed. It’s really not worth the risk now, is it?

Do you have any security tips for our members? Why not share them?

Related articles:
Can the CIA hack your smartphone?
How to make your email hackproof
How easily can your phone be hacked?

Exit mobile version