8 Things To Do After Been Hacked

Things To Do After Been Hacked

Don’t know what to do after been hacked?

No problem, read the article below. I have mentioned 7 best things which can be done after been hacked by somebody.

1. Let your other contacts know about the hack

If your e-mail account or any account with contacts has been hijacked, make sure to let all of your contacts know about it. To help gain access to more accounts, hackers may send malware or try attacking any other accounts associated with yours since your contacts may not be as suspicious of emails coming from people they know.

2. Completely wipe your old hard drive (repartition, and format)

If virus and spyware scanning reveals that the hack threat is gone, you should not trust that your PC is free from malware . The only way to ensure that the drive is completely clean is to use a hard drive wipe utility to completely blank the drive and then reload your operating system from trusted media.

After you must have backed up all your data and put the hard drive back in your computer, use a secure disk erase utility to completely wipe the drive. There are many commercial disk erase utilities available. The disk wipe utilities may take several hours to completely wipe a drive because they overwrite every sector of the hard drive and they often make several passes to ensure they didn’t miss anything.

3. Check for Backdoors

Smart hackers won’t just get into your system, they’ll also set up tools to make sure they can get back in once you’ve gotten them out. Once you have your system fully back, you should immediately make sure there isn’t a back door somewhere designed to let an attacker back in. Check your system to make sure nothing is getting forwarded to another system without your knowledge. See if the answers to your security questions were changed, or if those questions themselves have changed.

4. Reinstall anti-virus, anti-spyware, and other security software prior to any other programs

Before loading any other applications, you should load and patch all your security related software. You need to ensure your anti-virus software is up-to-date prior to loading other applications in case those apps are harboring malware that might go undetected if your virus signatures aren’t current.

5. Secure Your Wireless Router

Wireless router is the first firewall for a computer. It is the first line of defense. Never leave your wireless router ‘open.’ Here are a few important changes you can make to your wireless network settings to secure your wireless network: ==> Enable encryption ==> Wireless routers offer either WEP, WPA or WPA2 wireless encryption.

Both WEP and WPA are old and can be cracked within a few seconds. WPA2 is the latest encryption standard, offering “government-grade” data encryption. Change the password for Web Access – Replace the default password assigned by the manufacturer, so that hackers can’t crack the password.

It’s important for you to replace the default password with a strong password. Create a strong and random password using a combination of uppercase letters, lowercase letters, symbols and numbers. Changing the SSID doesn’t necessarily provide additional security – Replace the default Service Set Identifier (“SSID”) with something unique, but it could discourage hackers as they now know that you have taken steps to secure your wireless network.

6. Isolate Your Computer

In order to cut the connection that the hacker is using to “pull the strings” on your computer, you need to separate it so that it can’t communicate on a network. Separating it will prevent it from being used to attack other computers as well as preventing the hacker from continuing to be able to obtain files and other information. Unplug the network cable out of your PC and turn off the Wi-Fi connection. If you have a laptop, there is often a switch to turn the Wi-Fi off. Don’t

rely on doing this through software, as the hacker’s malware may tell you something is turned off when it is really still connected.

7. Use a Virtual Private Network

Use a Virtual Private Network (VPN). VPN will provide a second line of defense for your personal information. With a Virtual Private Network, your computer’s location, IP address, and a host of other information hackers use to gain access to your computer will remain anonymous. Hotspot Shield VPN can create a VPN between our Internet gateway and your laptop or iPhone. This incomprehensible tunnel prevents hackers, snoopers, ISP’s, or anyone from viewing your downloads, instant messages, credit card information, web browsing activities or anything else you send over the network. Hotspot.

8. Reload the operating system from trusted media and install updates

Make sure to use your original OS disks that you purchased or that came with your computer, do not use any that were copied or are of unknown source to avoid been hacked again. Using trusted media helps to ensure that a virus present on corrupt operating system disks doesn’t reinfect your Computer. Download all necessary updates and patches for your operating system before installing anything else.

Leave a Reply

Your email address will not be published. Required fields are marked *