Featured Cyber Tips

What to Do When You Get Hacked: A Step-by-Step Guide

Here’s a simple guide to help regain control of your digital identity and minimize the damage if you’ve been hacked. 

The Digital Nightmare: What to Do When You Get Hacked 

Cybersecurity experts predict cybercrime will hit a staggering $10.5 trillion by 2025. That’s right, trillion. Now that we have your attention, here’s the alarming reality: getting hacked is a risk everyone faces. The unfortunately reality is that everyone is a target when it comes to cybercrime. Even if you aren’t targeted directly, you could still suffer the fallout if a company, service or app you rely on is compromised – and these days, it’s likely to be the case. The consequences of a hack can be severe, ranging from identity theft and financial loss to unauthorized access to sensitive personal or business information.  

Phishing attacks continue to be a significant problem and can trick employees or consumers into disclosing credentials and weak passwords can be exploited to breach your accounts. Malware can infect devices, leading to data theft, ransomware attacks or even the complete loss of access to important systems. These breaches can result in financial ruin, reputational damage or long-term privacy violations, making cybersecurity a critical concern for all. 

 Here’s a simple guide to help regain control of your digital identity and minimize the damage if you’ve been hacked. 

The Types of Data Hackers Target 

Cyberattacks can expose a wide range of sensitive data, from personal details to business records, putting both individuals and organizations at risk of identity theft, fraud and reputational harm. A cyberattack against a small business can cost up to $650K, due to increased costs from business disruptions, lost customers and regulatory fines. Knowing what kind of data hackers typically steal and how to protect it is key to reducing the fallout from them. Here’s a summary of the type of data that cybercriminals are after and how you can protect yourself if it gets into their hands: 

Type of Data  What Hackers Target  How to Protect Yourself 
Personal Identification (PII) 
  • Social Security/Social Insurance Numbers  
  • Driver’s license, 
  • Passport info 
  • Birthdates 
  • Use strong passwords 
  • Enable MFA 
  • Encrypt sensitive data 
  • Avoid unsecured websites    
Financial Information 
  • Credit/debit card numbers 
  • Bank details  
  • Payment platforms 
  • Tax records 
  • Invoice details 
  • Set up banking communication alerts 
  • Enable MFA 
  • Contact credit bureaus to freeze access to your credit file  
  • Use virtual or temporary credit cards when travelling 
  • Avoid email-only wire transfers 
Login Credentials 
  • Usernames  
  • Passwords 
  • MFA codes 
  • Security answers   
  • Use a password manager that isn’t stored in your browser 
  • Enable MFA for important accounts 
  • Don’t re-use passwords  
Health Information 
  • Medical records 
  • Insurance details 
  • Prescription info    
  • Monitor accounts for unauthorized activity 
  • Use strong passwords 
  • Enable MFA   
Corporate Data 
  • Intellectual property 
  • Employee SSNs 
  • Customer records & payment info 
  • Trade info  
  • Encrypt files 
  • Train employees 
  • Protect sensitive data when traveling 
  • Only connect to secure networks 
  • Implement EDR, MFA and cyber policies 
Communication Records 
  • Emails 
  • Messaging histories 
  • Contact lists 
  • Phone numbers    
  • Use messaging platforms with encryption 
  • Use secure apps 
  • Enable MFA for all logins 
Location Data 
  • GPS information 
  • IP addresses 
  • Geolocation data 
  • Turn off unnecessary app and browser tracking 
  • Use a VPN or a private browser 
Purchase History 
  • Shopping records 
  • Transaction histories 
  • Loyalty card details   
  • Avoid storing payment info 
  • Regularly monitor your accounts 
  • Use virtual or temporary credit cards 
  • Be extra cautious during holidays

Steps to Take Right After a Hack Attack 

Secure Your Network

First, disconnect the compromised device from the internet to stop data theft and malware spread. Use a secure network or VPN to safely assess the damage. If possible, avoid cutting power to systems as this erases important forensic data and can also damage computer components. BOXX clients can immediately contact the Hackbusters™ team to identify vulnerabilities and guide them through securing accounts and devices without risking further exposure. 

Run a Virus Scan 

Run a full antivirus scan immediately to detect and remove any malicious software on your device. 

Update Your Software

Make sure all your software is up to date. Hackers exploit outdated or vulnerable systems, so patch any gaps ASAP.
 

Change Your Passwords 

It is critical to change your passwords to ensure that criminals are not able to access your accounts. It is also good practice to validate and reset MFA on your accounts to ensure you are getting the notifications and that any old authorizations are no longer valid. 

Check for Damages

Check your important accounts first—bank, credit cards, and investments—since financial losses can happen fast. Look for unusual transactions, password changes, new devices, or failed logins. Check your email for any password reset requests or suspicious activity. Then, look for and delete any mail handling rules, as hackers use this feature to hide their account activities from you within your own accounts. Lastly, review your social media accounts for strange posts or messages that could mean someone else has control. If you spot anything suspicious, report it to your bank.
 

  • Financial Coverage: Pays for losses from fraud 
  • Identity Help: Assists in restoring your identity 
  • Expert Support: Provides cybersecurity advice and prevention tips 

Close Your Digital Windows and Doors 

Don’t leave your digital doors and windows unlocked — protect your personal and business data now with BOXX’s Cyberboxx Home and Business solutions and get expert help when you need it most.

Related posts

Cyber Tips Cyber security examples and best practices

Cyber security examples and best practices

Being protected does not need to be expensive. Here are 10 tips to increase your cyber security without spending a ton.

22/06/2018
Featured Cyber Tips Here’s Why You Should Care About Cybersecurity Awareness Month

Here’s Why You Should Care About Cybersecurity Awareness Month

October marks Cybersecurity Awareness Month, a global initiative aimed at raising awareness about protecting ourselves online.

01/10/2024

Sign up for the BOXX Insurance Newsletter

Get the latest updates about Cyber Insurance and Protection with our newsletter.