Nowadays, it’s increasingly common to become the victim of a hack. However, you don’t need to worry about it or get confused because this post offered by MiniTool Solution will tell you what to do if you have been hacked.

In your daily life, you may use antimalware software to protect your computer. However, sometimes your computer is still invaded by malicious hackers and malware because they can change their tactics so that antimalware software can’t find them.

How To Remove Malware From A Windows Laptop
How To Remove Malware From A Windows Laptop

It is necessary and urgent to remove malware from laptop immediately when the virus/malware is detected; your data is secure only if your system is clean.

Read More

Then a question comes here – how to know if you have been hacked. The following are some hacking signs:

1. You can’t log into your account.

2. Your device is acting strangely.

3. Your webcam lights up when it is not in use.

4. Your browser is being rebellious.

5. A hacker tells you that they have compromised you.

6. Activity that wasn’t yours.

Tip: If you want to learn more about the hacking signs, this post – How to Know If Your Computer Has a Virus: Signs of Infection can satisfy your demands.

Now, I will introduce what should you do if you have been hacked. Keep on your reading.

What to Do If You Have Been Hacked

1.   Wipe Devices and Perform a System Restore

Once you have determined that you have been hacked, the first thing you need to do is wiping your hard drive and performing a system restore since a compromised computer can never be fully trusted again.

If you have created a system restore point in advance, you can perform it now. Maybe this post – What Is System Restore Point and How to Create It Look Here is what you need. You can also try to reinstall the system to make sure that you have a clean system.

Then you can try the following advice below if you have received you have been hacked message.

2.   Change Passwords

Hackers use the password to get access to your accounts and networks. Thus, you need to change your password is the easiest to prevent this situation from happening again. It’s not recommended to couple your email addresses with a weak password, such as “‘123456”.

If your passwords are too simple, a hacker requires minimal effort to gain access to your account. As well as complexity, make sure that they are never reused on multiple accounts, no matter how convenient, which is the key to effective secure passwords.

3.   Turn on Two-Factor Authentication

If you have been hacked, you can try to turn on 2FA( two-factor authentication) for your Microsoft account. Once you turn it on, it’s more difficult for hackers to sign in, even if they have got your password.

You can set your phone number or an alternative email address to protect your Microsoft account. Here are the steps:

Step 1: Access your security settings on your Microsoft account.

Step 2: On the Security settings page, you should click Add security info.

click Add security info

Step 3: You can choose A phone number or An alternative email address to verify your identity. Here we take the phone number as an example, and you should input your phone number and choose a way to verify the phone. You can choose Text or Call and click Next.

verify your identity

Step 4: Input the code you have received and click Next, then you have turned on 2FA.

Tip: After setting up 2FA on your Microsoft account, you will be asked to enter a security code each time when you need to log in to Outlook or another Microsoft service. If you change your phone number, make sure you have the latest security information.
4 Solutions to Secure and Protect Your Microsoft Account
4 Solutions to Secure and Protect Your Microsoft Account

In your daily life, you can log in many devices and websites with Microsoft account. Thus, it’s important to secure and protect your Microsoft account.

Read More

4.   Monitor Your Accounts

Attacks rarely stop on one account. If hackers have some success, they are likely to try to control other accounts. After you have been hacked, an attack on one area should always be considered a signal to double-check the security of others.

You should check your email to make sure they don’t use your account to forward information and make sure they don’t use social media accounts to contact people you follow.

Even if you lose control of your account, you can still restore it. For many major accounts, including those held by Google, Facebook, Twitter or Apple, there are account recovery tools or processes to prove your identity to make you regain control of the accounts.

5.   Check Your Bank Statements

You should not only check the email and social media accounts. Pay attention to your transactions. The main reason for hackers invading Internet accounts is to make money. Once they get the information on your credit card, they will attempt to make purchases until that card is blocked.

If they can get into your PayPal account, your money will be transferred to an account they control.

After getting the “you have been hacked” message, you should immediately alert your bank or other financial institution. If you think your credit card details have been compromised, contact these institutions to cancel the card.

But keep your eyes on your bank accounts, just in case. You may not see anything for a few days since charges don’t always appear immediately.

6.   De-Authorize Apps on Facebook, Twitter, Google, etc.

Some social media services allow you to link apps to your account. These applications can post information for you, and read and write information about your account. You may have authorized many applications to use Facebook or Twitter, but you don’t notice that hackers implant their own applications and you continue to use these applications.

De Authorize Apps on Google

What to do if hacked? You need to check the social media platforms you use and. If you don’t recognize any authorized apps, revoke their access.

7.   Delete Any Sensitive Data from the Hacked Account

Maybe it’s too late, but just in case, you had better delete all really sensitive data from the hacked account. It doesn’t mean they have browsed all your data or files, or have copied everything that they have access to your account.

Therefore, if you are concerned about any important files, especially those containing personal information, delete them immediately. This is especially true for services like Dropbox, Google Drive, and iCloud Drive. If you store important files on these cloud services, you should clear the folder right now.

Also see: Google Drive VS Dropbox: Which Is Your Best File Storage Choice

Tip: You had better back up these important data in advance before deleting them.

Now, you have known what to do if hacked.

Tip: You may encounter a scam on the Internet – Internet Security Alert. This post – How to Remove the “Internet Security Alert” Pop-up Scam can help you get rid of it.

Here is all the information on how to know if you have been hacked and the things you need to do after you have been hacked.Click to Tweet

Back up Your Data to Keep It Safe

In most cases, keeping a regular data backup is as important a step in seeking to protect against threats as strong passwords and antivirus software. Once your data get lost because of the hackers’ attack, you can use the backup to restore it.

In order to back up important data, you can choose to take a piece of third-party backup software – MiniTool ShadowMaker.

MiniTool ShadowMaker is a professional backup program that can be used to back up the operating system, disk, partition, file, and folder. In addition, it is a user-friendly program to provide protection for your computer and data.

To back up data, you can download MiniTool ShadowMaker Trial which can be used for free within 30 days from the following button.

MiniTool ShadowMaker TrialClick to Download100%Clean & Safe

Now, I will show you how to back up files step by step with pictures.

Step 1: Launch it to click Keep Trial and choose Connect in This Computer to continue.

choose Connect in This Computer to continue

Tip: You can also manage the remote computer as long as they are on the same LAN.

Step 2: After entering its main interface, go to the Backup page. Then click the Source module to choose the backup source. As for data backup, please choose Folders and Files to continue and choose the files you want to back up.

choose Folders and Files to continue

Step 3: Returning to the Backup page, click the Destination module to select the destination path so as to save the backup image. It is recommended to choose an external hard drive.

choose the backup destination

Step 4: After having successfully selected the backup source and destination, you can click Back up Now to perform the data backup action immediately. Or you can choose to click Back up Later to delay the process of the backup.

click Back up Now to perform the data backup immediately

When the process is finished, you have successfully backed up files and have provided protection for the data. From the above information, you can see MiniTool ShadowMaker is a very easy and convenient tool.

Further Reading

It’s also recommended to use the Sync feature in MiniTool ShadowMaker. In this way, you can also provide protection for files. File synchronization is another form of backup which enables you to store files in two or more physical locations such as external hard drives, USB flash drives and so on.

Here is how to sync files:

Step 1: After launching MiniTool ShadowMaker, go to the Sync page.

Step 2: Click the Source and Destination module to choose the files that you want to sync and the storage path.

Step 3: Click the Sync Now button to immediately perform the sync process.

click the Sync Now button to immediately perform the sync process

Also see: 5 Useful Solutions to Sync Files Among Multiple Computers

With the professional file backup software – MiniTool ShadowMaker, I have successfully backed up my data and files with ease. Now, I have already provided protection for my data.Click to Tweet

Bottom Lines

In conclusion, you can know the hacking signs and what to do if you have been hacked from this post. I have also introduced how to back up data with MiniTool ShadowMaker to protect it on Windows 10.

In addition, if you have other suggestions for preventing the computer from hacking, share them in the comment zone. What’s more, if you have any problem with MiniTool ShadowMaker, please don’t hesitate to contact us via the email [email protected].

You Have Been Hacked FAQ

?Can hackers be traced?
Hackers can be traced. When your PC is attacked by a Trojan or a virus, you can know about its presence from the machine malfunction. A cracker or a hacker can be tracked down in several ways. You can use the IP address of the hacker to trace him.
?What do hackers do when they hack?
They break into your computer systems to steal, change, or destroy information by installing dangerous malware without your knowledge or consent.
?Can you tell if your phone is hacked?
If your device loses power quickly, restarts suddenly or you notice outgoing calls that have never been dialed, then your smartphone is most likely hacked.
?What can people do with your IP address?
The IP address is the device’s unique signature, and the port is the channel that allows applications and other devices to send you information. Your device may have open ports that allow hackers to access your connection and learn your IP if you are connected to the Internet and running a program.
  • linkedin
  • reddit