Hacking - what it is and what to do about it. A Wilsons Detective Guide
There is a growing feeling that anti-malware software is not up to the job of stopping the most determined and skilled hackers who can change tack at will, shifting around a byte here and there and coming up with a new strategy. At Wilsons Detectives a lot of the work that we do is concerned with combatting hacking for businesses and individuals and we have put together a guide that we hope will help you to identify an attack and then keep your systems safe from hacking. We will run this guide over this and the next few blogs.
The impact on business from hacking is huge both in the cost of what is paid for ransoms and to get the situation resolved. So lets start with the ways that you can tell that you might have been hacked.
1. You see a ransomware message 2. You see antivirus messages that are fake 3. Unwanted browser toolbars appear 4. Any internet searches you make are redirected 5. Random popups appear frequently 6. Your friends get invitations on social media from you that you have not sent 7. Your password does not work 8. There are software installs unexpectedly 9. Your mouse moves makes selections between programs independently 10. Registry Editor, Antimalware, Task Manager is disabled 11. You notice money missing from your online account 12. You are notified by someone that you have been the victim of hacking 13. There has been a leak of confidential data 14. Your credentials are in a password dump 15. Strange network traffic patterns are observed
If any of this is seeming sickeningly familiar then the first thing that needs to be done is to have your system completely restored to a ‘clean’ state. This used to mean that you would have to format your computer and then restore all the data and programmes. These days, however, it can be as simple as clicking on a button marked ‘restore’ although once your computer has been compromised you should not trust it. The Wilsons Detectives team will be happy to help you to ensure that your systems are free of ransomware. In our next blog we will begin to study each of the 15 signs above and what can be done when you realise that you have been hacked.