The most dreadful thing has happened – your computer or network has been hacked.
Your reaction can make this a minor inconvenience or a horrible disaster, bringing your business to a halt.
Consulting our cyber security experts, we have identified the signs of a compromised computer, and the five steps you need to take immediately after.
Signs Of An Issue
According to IBM, it could take up to 277 days before a data breach is noticed. By then, irreversible damage has occurred.
A slow computer could be a major warning sign, but many users think it’s due to an outdated operating system. It’s recommended to contact your IT team – if there is an attack, they will know what to do. If it is a system issue, they might upgrade it or replace your device.
Here are the main signs that your computer could be infected:
-
Slow computer or network performance
-
Frequent freezes or sudden crashes
-
Rapid pop-ups
-
Locked user accounts
-
Sudden and unexpected file changes
-
Abnormal system behavior, such as the device continuing to run after a shutdown
-
Unusual account activity
What To Do Next
If you’re experiencing any of these issues, you should:
1. Take the network offline, but DO NOT turn off the device or reboot it.
When a computer freezes, the most common response is to hit “restart”. This may work in some situations, but if malware has been installed, the reboot can trigger a file-encryption process that causes data loss. Instead, disconnect your device from the network to isolate the incident, but keep it on for the next steps.
2. Call your IT team IMMEDIATELY.
Do not try to fix it on your own, inform your IT team immediately. They will be able to identify the issue and control the breach before it infects the rest of the network. Do not try a “system cleanup” or run an antivirus scan, as this will waste time and even cause more damage.
3. Change passwords and secure all accounts.
Change all your passwords, yes all, to protect your other accounts which are not compromised. Hopefully, multifactor authentication is enabled, and you will be notified if someone tries to access your accounts. If not, start by setting up MFA on your accounts, especially those that contain financial information.
4. Check your bank accounts.
While the IT team handles the breach, you should check your bank accounts and payment processing tools, including third-party merchant accounts, for any suspicious activity.
5. Call your attorney.
If the data breach is significant, calling the company attorney might be a good idea. They will advise you on the federal and state laws that may be affected by the data breach.
___________________________
If your business suffers a cyber-attack, there are further steps to take, such as communicating with customers and stakeholders, but the most important thing is to hand over this matter to a qualified cyber security professional.
An even better precaution is to have one at the ready before an attack happens. Our team can be your reliable MSP. We’ll start with a Cyber Security Risk assessment to identify any vulnerabilities in your network, and map out a plan to fix them. Book your assessment today.