Security
Now Reading
Checklist to answer have I been hacked

Have I been Hacked

Have I been Hacked is often something we are asked by customers, but we want to go through steps to help identify any such issues. Any business that has online dealings should be aware of the dangers online, there is always a threat of hackers. If the severity of the attack is low it is highly possible it will go unnoticed, the damage can be done before any discovery is made. We need to make sure any potential threats are discovered before they cause irreparable damage to your infrastructure.

If you have been hacked by an outside force, the signs may not be obvious but you can detect there is something wrong with your network, with this we can look for the warning signs as below:


How will I know if I have been hacked?

There can be many warning signs, but often they may be dismissed as general computer issues. Have a look at the following for any possible signs of attack:

Browser Highjacked

Your default Search Engine may be compromised resulting in you being taken to an untrustworthy source. The result of this can mean your Search Traffic is compromised and also you could be served ads or phishing attempts.

Browser Toolbars

If you have noticed any additional toolbars you are unfamiliar with these can be malicious, they can contain Adware, Malware or cause other problems with your computer.

Missing Files

Have you suddenly lost files that you are certain you didn’t remove? It could be user error but it may be more sinister, a hacker may have moved or removed files, the computer may have been infected with Ransomware causing the files to be encrypted and in some scenarios the file will not look the same to the user so they may think the file is missing.

Slow Computer Response Time

An infected computer that is infected with Malware, Worms or other Viruses can slow down considerably as the resources will be eaten up by the running processes.

Questionable Log Files

A clear way to tell if you have been hacked would be if you have Administrators or users accessing the network from strange locations. You should check user activity logs and also make sure there are no new users created that you do not recognise.

A method often used in Cyber Attacks to create a new username with usable permissions and try to go undetected, we see this when taking on new clients with managing their Office 365.

What Else Can We Do?

Making sure you have an Antivirus with active threat prevention would definitely be a step in the right direction, other things that can be done is to limit your account permissions so in the event of a hack that the damage can be limited.

If you are unsure if you have been hacked or want to make sure you prevent an attack in the future, Hamilton Technology can do a network audit to make sure you are okay.

Alternatively you can call 03330 509625 or complete the form below.


 



What's your reaction?
Happy
0%
Cool
100%
Really?
0%
Wow
0%
No Way!
0%
Elated
0%
Thumbs Up
0%
Wink
0%
Laugh
0%
Glad
0%
Cheers
0%
Tongue
0%
Coffee
0%
Halo
0%
Sleep
0%
Halo
0%
Angry
0%
About The Author
Carl Hamilton
Carl Hamilton
Technology enthusiast, Entrepreneur, father, adventurer and looking to use education and technology to change the world.

Leave a Reply

chtsiserve-com