What should I do if I suspect my computer has been hacked?

Getting an email that tells you that your computer has been hacked or seeing suspicious activity on your computer is a cause for deep concern.  Hollywood and the press has done a great job of raising our levels of concern for this kind of intrusion.  There are a few signs of intrusion you can look for, a few things to do if you see signs of intrusion, and a few things you can do right now to prevent it.

Signs of intrusion

  1. Do a virus and a malware scan right now.   Our pick for the best free scanner and protection is Bitdefender Free Edition.  It has fast scans, a lightweight footprint, and excellent virus protection.  Our pick for the paid antivirus editions is Webroot.  Covenant Computing is a Webroot vendor.  That is because we carefully curate our selections for our customers and this product has proven to be top notch.
  2. Extra programs or toolbars you did not install.  Many programs download with others, and this is normal, but sometimes these programs are not the programs you installed. Did you remove them, but they keep coming back?  That is not uncommon.  Sometimes it takes a full virus scan to remove these programs.
  3. Super slow computer performance.  Check your system resource usage by right clicking your taskbar and selecting “Task Manager” from the choices.  Once the Task Manager starts, click on the performance tab to see where your system resources are being used.  If any of these stats stays above 75% for an unusual amount of time (hours), it is probably time to go get it checked out.
  4. Your friends are receiving emails that you never sent.  This is a sure sign that your computer has been compromised.  Turn it off and call us. 
  5. Ransom messages if you are getting messages telling your that your files are encrypted and you have to pay money to get them back, turn off your computer, and call us.  We may be able to save your data or help you get back on your feet.
  6. New home pages or search engines filtering everything.  This is a classic sign of malware and needs to be removed using a malware scanner.
  7. Passwords no longer working.  This one can leave you frustrated for sure.  Use the password recovery process to recover your account which requires you to change it.  Then, do a scan on your computer for malware and viruses.  Then change your account passwords for your key accounts: email, financials, social media.

What to do if your are showing signs of being hacked

  1. Change your passwords.  Yes, all of them, especially your financial institutions, email, and social networking accounts.  These are the most targeted.  It is a pain, but it is worth it.  We recommend using a password encrypting app called LastPass.  This gem of a program can be used on your PC, phone, or tablet to encrypt all of your passwords.  It can be accessed offline, you only have to remember one password, and all for free.
  2. Wipe your computer completely and reinstall your operating system.  You probably want to get a professional for this because they will save a copy of your hard drive and data ahead of time.  Schedule an appointment with us, and we will be happy to help.
  3. Alert the credit reporting agencies.  It is a high risk proposition for someone to get access to your information, so have the agencies lock down your credit.  You can reach them at the following links: Experian, Equifax, Transunion  
  4. Tell your social media contacts, email contacts, and family you suspect you have been hacked.  They need to know too so they can avoid any attempts to gain information by someone using your name.
  5. Check your recovery information in your accounts.  Go back to your key accounts and be sure they don’t have someone else’s recovery email or phone number in them.  It is a trick they use to change your account password again in order to get access.

Preventive measures

Probably the biggest preventive measure is to not believe what a screen tells you.  If your screen is telling you that you have been hacked, chances are, they are trying to get you to panic so you will be easier to draw personal information and money from.  Don’t call the number or click the link on the screen.  Call your local computer company.  They will tell you what needs to be done.  Other things you can do:

  1. Password management.  We recommend using a password encrypting app called LastPass.  This gem of a program can be used on your PC, phone, or tablet to encrypt all of your passwords.  It can be accessed offline, you only have to remember one password, and all for free.
  2. Antivirus and Web Protection.  Covenant Computing has several options, but the ones we recommend are Webroot and Bitdefender.
  3. DNS Filtering.  Again, we have several options we recommend.  OpenDNS is the best way to protect your family/home/office against unwanted content and against malware and scareware.
  4. Limit your use of public networks.Places like coffee shops, the airport, etc. are hotbeds for hackers trying to get your information.  They will set up open networks that look legitimate, but are really run from a device in their backpack that sits next to them.  They don’t really have to do anything except turn the device on and sip a cup of coffee, so you won’t see them typing furiously away at a keyboard with a dark hoodie on and a look of angst on their face.  These devices can listen in on your traffic and you will never suspect it.  Instead…
  5. Use VPN.  If you don’t have a VPN set up on your home network, use ExpressVPN.  They have extremely fast servers and they are geo located, so wherever you are going, they are probably already in the area.
  6. Don’t follow links in emails to key accounts.  A favorite trick of hackers is to email you something that looks like a legitimate email but it includes links to their own web sites in an effort to get you to enter password information.  Don’t do it!  Use your own bookmarks to the sites you use and don’t use the links in the email.

Well, this was a lot to absorb.  We hope it helps you, and if you feel like you need some assistance, contact us, and we will be happy to help you.

author avatar
Covenant Computing
Skip to content