What if you've been h*cked? Your 5 next steps


Thanks to the coronavirus, the transition to living life through our devices has become very real.

Our lives have now been changed in ways we never expected.

This transition includes doing most things from home —like working, banking, healthcare, education, shopping, and even socializing.

It's ironic - while moving our lives online has made so many things more convenient, it's also created a perfect storm for cybercriminals. They're having a field day, especially playing off the anxiety that so many understandably still have about the pandemic.

However, there are proactive steps to take when you suspect an account may be compromised, including ways to help keep it from happening to begin with.

Red Flags of a Compromised Account

Look for irregularities in any accounts as a sign of compromise. Receiving alerts from businesses, banks, social media, and other accounts that logins to your accounts were attempted is a huge red flag.

It doesn’t necessarily mean there’s been a compromise, but it lets you know that others have tried.

Taking immediate action on any suspicious activity, no matter how insignificant it may seem, should always be Step One.

Immediately change account passwords, especially those showing activity you didn’t authorize.

Best to freeze accounts where finances and other important data are kept, when possible; you can always unlock them later.

Regularly check credit reports for irregular activity and don’t hesitate to freeze them from further use.

TransUnion, Experian, and Equifax no longer charge to freeze and unfreeze your accounts, so don’t hesitate to do so if needed.

Alert Your Accounts, Especially Financial, about Compromise

If you suspect a financial account has been compromised, alert ALL of the institutions that deal with your finances.

These should include banks, credit card companies, credit bureaus, Google, Apple, Amazon, PayPal, Venmo, and other accounts where your financial data is stored or from where it’s accessed.

Alerting the involved companies can also serve as a heads-up to them that a larger hack may be in progress and may prevent others from being victimized.

Protect Your Passwords and Change Them Regularly

Protecting the keys to your kingdom starts with savvy and strong password use.

Studies show compromised passwords are responsible for 81% of hacking-related breaches.

All passwords should be long and include upper- and lower-case letters, numbers, and special characters.

Change them regularly and consider using a password manager if you can’t remember them all.

Also, look for accounts and apps you haven’t used in a long time and delete them to reduce password exposure and hacking opportunities.

Some of the survey statistics on poor password use include:

  • 65% of people reuse passwords across multiple or all accounts
  • The average person reuses the same password up to fourteen times
  • 91% say they understand the risks of password reuse across multiple accounts, but 59% admit they do it anyway

Use 2FA and Update Preferences

Two-factor authentication (2FA) or multi-factor authentication (MFA) should always be used when available.

They add layers of login protection that verify it’s you who’s signing into your account and not a cybercriminal.

Update preferences used for your 2FA, especially if you use security questions as part of authentication.

The answers to these questions can often be found on your social media and other accounts, and if they are, be assured hackers will find them.

Always update 2FA immediately if account compromise is suspected.

And last…

Limit What You Share Online

Your PII (personally identifiable information) should remain with you and not broadcast on social media and other sites.

PII nuggets such as your address, where you live and work, schools attended, LinkedIn profile and info about family and friends are cobbled together by hackers to create an identity profile that helps them enter your accounts.

Hijacked PII is also used for socially engineered and spear-phishing email attacks.

These methods use your PII for email phishing and targets those you know, including co-workers, family, and friends.

The emails use your identity as bait for the recipients who blindly trust the email and its contents because they believe you are the sender.

Stay safe,

Your Dicar Networks Team


Many of our readers appreciate the peace they have, knowing they're protected from malware and scams through our CNVA Program (Continuous Network Vulnerability Assessment).

For just $80 a month, you can relax too, knowing that your network is under constant monitoring.

If interested in having true confidence in your network's security, call us at (408) 850-6400 or simply reply to this email with "Assess My Network." (mention that you found us through this email)

Every business is different. That's why we give Tailored IT Solutions so you never have to overpay for tech-bloat.

Here’s how we can support your growth:

  1. Strategic IT Insights – Uncover productivity and growth opportunities with our Business IT Diagnostic Worksheet and Project Planning.
  2. Custom Managed IT Services – Gain peace of mind with IT solutions tailored to your specific requirements and budget.
  3. Next-Gen AI-Driven Security – Protect your business with AI-enhanced, cloud-based physical security, including smart cameras, access control, and environmental monitoring.

Ready to secure and streamline your business? Let's connect today and start building your path forward.

Dicar Networks Offices are located in Morgan Hill, and San Jose, California!

Corporate Office
295 E Dunne Ave #120
Morgan Hill, CA 95037
(408) 850-6400
sales@dicarnetworks.com