SHARE

Advice

What to do When You've Been Hacked 

You've received the ominous message that your account has been compromised. Now what?

June 8, 2017

Message: We have detected unusual activity on your account. Did you authorize this transaction?

At first you think the text from your credit card company is a mistake; then reality sets in. You may have been hacked. Your mind reels as you wonder what information the thieves were able to access and if your identity has been stolen. Sadly, this scenario is all too common. The Federal Trade Commission reports that 11.7 million people find themselves as victims of identity theft every year.

Cyberattacks target individuals and huge corporations alike. While reputable companies take cyber threats seriously and institute multiple layers of protection, hackers relentlessly pursue ways around obstacles between them and your information. Should you get hacked, take action immediately. 

Step 1: Contact

Contact your financial institutions. Alert them and order new credit and debit cards. Inform the three major credit bureaus about the breach, and ask for credit monitoring, fraud alerts, as well as copies of your credit reports.

Equifax.com // 800.685.1111
Transunion.com // 800.916.8800
Experian.com // 888.397.3742

Step 2: Report

Report identity theft, by phone and in writing, to local, state and federal law enforcement. Keep records of all relevant correspondence. Contact the Federal Trade Commission as well for next steps.

Identitytheft.com // 877.438.4338

Step 3: Reset

Reset passwords. Use a complex and unique mix of numbers, cases and symbols for every website you use. Experts blame weak or stolen user names and passwords for 76% of data breaches. Consider using password manager software if needed. If the website offers two-step authentication, use it.

Step 4: Check

Routinely check for fraudulent activity. Watch your monthly statements, emails and regular mail and report unauthorized or suspicious activity immediately.

Step 5: Notify

Notify your contact list to delete strange emails that appear to be from you.

Step 6: Secure

Secure your information by keeping software up to date and installing an antivirus product. Be thoughtful about information shared online or via telephone. Shred sensitive material or store securely in a digital or physical vault.

Step 7: Defend

Stay alert. Vigilance and careful behavior online (e.g., using secure sites denoted by https in the URL) offer a strong line of defense against hacking.