Bonus Tip: What To Do If You Get Hacked
McRae Capital Management’s Cybersecurity Series
As a follow-up to our Cybersecurity email series, we want to provide guidance on initial steps to take in case of a suspected compromise or if you have been notified of a data breach. Your quick actions are crucial to safeguard your information and security. Here are the initial steps to take after a suspected compromise or data breach.
Actions to Take If You Become a Victim of Identity Theft
- Go immediately to: www.identitytheft.gov.
- Place a fraud alert on your credit reports.
- Contact affected institutions.
- File a police report.
- Reach out to the Social Security Administration and IRS if your Social Security Number is compromised.
Actions to Take If You Believe You've Been Hacked
1. Financial Account Compromise:
- Contact your financial representative immediately.
- Change your password from a different device.
- Untrust old or lost devices.
2. Email Account Compromise:
- Log in from a new device.
- Create a new password.
- Check email settings for unauthorized rules or filters.
- Untrust old or lost devices.
3. Device Infection with Malicious Software:
- Stop using the infected device.
- Disconnect from the internet.
- Contact an IT professional to clean your device.
Steps to Take if You Have Been Notified of a Data Breach
1. Immediate Actions:
- Change passwords on affected accounts.
- Sign up for updates from the breached organization.
- Assess the severity of the breach, focusing on sensitive information like credit card numbers, financial data, or personally identifiable information.
- Enable push notifications for financial data, especially for credit card transactions, to quickly identify and dispute unauthorized charges.
2. Data Protection:
- Utilize free credit monitoring services provided by credit card companies and banks, if available.
- Enable multi-factor authentication (MFA) on all accounts to enhance security.
- Secure social media accounts by changing passwords, reviewing activity, and logging out other active sessions.
- Review and address any suspicious content on social media.
3. Vigilance:
- Consider temporarily deactivating social media accounts to heighten security.
- Remain vigilant by monitoring accounts and financial information for any signs of fraudulent activity.