tie national, tie national LLC logo

Signs of a Hack and How to Respond


"Signs of a Hack and How to Respond" https://www.linkedin.com/pulse/signs-hack-how-respond-kathy-powell

You’re no stranger to the dangers out there, but if you’re like me you want a reference guide of the signs to look for to determine if you’ve been hacked, and how to respond if it happens to you or your business…well lucky you! You’ve stumbled on the right post.

Below are the two lists you’ve been looking for to determine if you have possibly been hacked, been loaded with malware, or other cyber attack methods and another to set you on the right course to respond to these incidents.

Red Flags of a Potential Cyber Attack

  1. Standard programs and files that won’t open or work.
  2. Files have been deleted, or contents have changed without your doing.
  3. You find that passwords have unexpectedly changed.
  4. Unknown software appears or unexpectedly begins installing.
  5. The computer is connecting to the internet frequently when you are not using it.
  6. Your internet searches are being redirected.
  7. Extra browser windows may appear, or turn off without your involvement.
  8. Unrecognized anti-virus software scans randomly appear.
  9. Additional toolbars are added to your internet browser.
  10. Frequent pop-ups load when you access the internet.
  11. Your mouse/pointer moves on your screen intelligently on its own.
  12. Your task manager, registry editor, anti-malware and/or anti-virus software appears to be disconnected or disabled.
  13. Your e-mail contacts begin to receive e-mails from you which you did not send.
  14. Money disappears from your bank account.
  15. You receive invoices or find payments made for purchases you did not make.

 How to Respond to a Cyber Attack

  1. Remove the source of the connection by disconnecting from the internet and disconnect your router.
  2. Shut down the computer and restart it using the safe mode referenced in the computer’s operating manual. (You can also use another safe device to look online for how to do this if the manual is no longer in your possession.)
  3. Access your programs and features from the control panel to determine if any new files were added and uninstall them immediately.
  4. Run a anti-virus/spyware scan before its next scheduled time to clean up any found concerns.
  5. Restore your files using a previously backed up date prior to the suspected hack.
  6. Warn e-mail contacts not to open e-mails or click on links from that time frame as they may be compromised.

— Business owner? Read on your tasks don’t end there …

  1. Alert financial institutions, HIPAA, SEC, FINRA or other applicable industry regulating bodies of the situation and follow their protocols on the next actions needed to protect your funds.
  2. Notify partners and clients of potential breach via phone calls (using a vendor to assist if necessary) as early as possible (state laws differ on minimum notification time frames and credit monitoring requirements).
  3. Send written notification via postal mail and electronic communication if possible which clearly states a data breach occurred, what information was compromised, and what remedies you are providing (such as a toll-free number for more details, free credit monitoring etc) and the steps you are taking to ensure no further damage is done.
  4. If this has affected more than 500 customers, many states will also require a notice to be filed with the attorney’s general office.
  5. Notify local and federal authorities.
  6. Notify your cyber insurance company of the attack.
  7. Consider calling in a cyber forensics team to test your network for find out the type of attack occurred, how it gained access to your network and further identify potential vulnerabilities that can be exploited so they can be strengthened before another attack occurs.
  8. Review and update your incident response plan at least once a year. This should be a written plan which includes all the steps necessary to take after an incident occurs, the contact details for each, and an updated map of your computer network to aid in assessing potential vulnerabilities.

Get More Info

Our latest updates