Signs you are being a victim of cybercrime
Signs of hacking
Modern society is electronic – a place where our banking, social life, mail, shopping and work is in cyber space. This comes with many dangers, the most alarming being hacking. The good news is that Loyal I.T. Solutions has an application called Perch, that tracks and monitors activities, known as Security Event and Incident Management (SEIM). To see Perch in action and the versatility of the SEIM, check out the Cyber Security Business Connect and Protect video. But before we elaborate a bit more about Perch, let’s look at the many ways that you could, unknowingly, be under attack.
Here are 8 possible red flags that you are being hacked:
1. Constant pop-ups in your browser
There are some legitimate sites that have pop-ups that are usually related to subscriptions, sales, or specials. However, when you start seeing pop-ups at every site, this is a warning that your machine may be compromised.
2. Toolbar changes
When you use search engines like Google or Internet Explorer regularly, you get used to seeing what is available on the toolbar, at the top of the screen. Some hackers can introduce new programs on the toolbar, without you changing your settings.
3. New software or unapproved software installed
Similar to the toolbar extensions and additions, you can often find new programs on your desktop or even your mobile phone. If these have not been added by you then they can be malicious if used. Alternatively, installing a good SEIM program is great way to protect yourself, and your business, from this event occurring as all new software and applications are reported as soon as they are installed.
4. Ransomware attack
Ransomware often comes in the form of an email asking for personal details (this is also known as “phishing”) and tries to entice the recipient into releasing personal details. Once the hackers receive these details, they may even attack your computer and threaten to encrypt your data – which makes it unreadable. They will then extort you into releasing funds etc. to have the data restored.
5. Social media changes
If you use social media (Instagram, Facebook, What’s App, Snapchat, Messenger etc.) you might start getting some messages from people that are on your friends list, but the messages contain information that the friend might not usually send – like a link to look at a video, or a link to get a grant or money. This may mean that their social media has been hacked. Alternatively, you may find that people alert you that there is a duplicate social media account in your name being used to defraud people or send messages out in your name.
6. Passwords have been compromised
You may receive a notification that someone tried to log in to your application, but many times you will not know that this has occurred until it is too late. A SEIM application will monitor for any potentially malicious activity on your networks or cloud products and alert you when it is breached. A SEIM application can also provide daily security logs, ensuring extra security. There are some excellent programs that assist you in keeping your network or computers safe however Loyal I.T. Solutions recommends Perch Security. To learn more about Perch, view the Q&A video here.
7. Anti-virus has been turned off or disabled
If a virus has attacked your computer, it may have turned your anti-virus off. You should get a pop up in the right-hand corner of your machine informing you of this.
8. Suspicious transactions on your bank account
Keeping an eye on your bank statements is important as it can show you if there are any transactions that are odd or not recognised. Sadly, sometimes this is the first sign of a financial hack.
What to do if any of these relate to you?
1. Reset your passwords
This is the first step in any hacking situation. Consider securing your password with Multi Factor Authentication as well, to make it extra secure.
2. Contact your bank or financial provider
If you have been a victim of a financial hack, then this is vital – so call your bank immediately. They have staff well trained in dealing with this type of cybercrime.
3. Scan your computer or network for viruses or programs, including non approved applications
Run a scan or get a trained professional to run a scan on your computer or network to find programs or malicious viruses and remove those programs. Installing a program that assists you in keeping an eye on your daily security needs is also recommended. A SEIM program gives you peace of mind and keeps you up to date with what is happening on your computer or network.
4. Try and recover your accounts
Most social media platforms have security questions in place that you can use to recover your account if a hacker has hijacked it. These questions are those like “what was your mother’s maiden name.” Each platform has the account recovery ability, using these security questions.
5. Inform your friends and family
Make sure you let people know if your social media or email account has been hacked and messages are being sent that are suspicious. You can also alert them that there is a fake profile and not to friend the person posing as you.
Sometimes a serious hack requires a serious solution, and this means backing up your data and reinstalling your operating system. This is known as a hard reset and works on phones as well. If you have concerns in doing this, seek advice from your IT or phone professional.
Loyal I.T. Solutions understands that hacking can occur, but recommends that by installing secure SEIM software - such as Perch - users will minimalise the damage caused by hacking. Perch has customisable and preset alerts to inform you of when these potentially malicious events take place so your I.T. provider or business manager can be aware and take mitigation actions should they be required. A SEIM application will give you peace of mind that you can thwart active attacks on your network as they are happening, assuring you that your network is safe to conduct business.
For more information on Perch please contact our team at Loyal I.T. Solutions.
|Tags:SecurityNetworking SecurityCyber Security|