SHARE

                  Advice

                  What to do When You've Been Hacked 

                  You've received the ominous message that your account has been compromised. Now what?

                  June 8, 2017

                  Message: We have detected unusual activity on your account. Did you authorize this transaction?

                  At first you think the text from your credit card company is a mistake; then reality sets in. You may have been hacked. Your mind reels as you wonder what information the thieves were able to access and if your identity has been stolen. Sadly, this scenario is all too common. The Federal Trade Commission reports that 11.7 million people find themselves as victims of identity theft every year.

                  Cyberattacks target individuals and huge corporations alike. While reputable companies take cyber threats seriously and institute multiple layers of protection, hackers relentlessly pursue ways around obstacles between them and your information. Should you get hacked, take action immediately. 

                  Step 1: Contact

                  Contact your financial institutions. Alert them and order new credit and debit cards. Inform the three major credit bureaus about the breach, and ask for credit monitoring, fraud alerts, as well as copies of your credit reports.

                  Equifax.com // 800.685.1111
                  Transunion.com // 800.916.8800
                  Experian.com // 888.397.3742

                  Step 2: Report

                  Report identity theft, by phone and in writing, to local, state and federal law enforcement. Keep records of all relevant correspondence. Contact the Federal Trade Commission as well for next steps.

                  Identitytheft.com // 877.438.4338

                  Step 3: Reset

                  Reset passwords. Use a complex and unique mix of numbers, cases and symbols for every website you use. Experts blame weak or stolen user names and passwords for 76% of data breaches. Consider using password manager software if needed. If the website offers two-step authentication, use it.

                  Step 4: Check

                  Routinely check for fraudulent activity. Watch your monthly statements, emails and regular mail and report unauthorized or suspicious activity immediately.

                  Step 5: Notify

                  Notify your contact list to delete strange emails that appear to be from you.

                  Step 6: Secure

                  Secure your information by keeping software up to date and installing an antivirus product. Be thoughtful about information shared online or via telephone. Shred sensitive material or store securely in a digital or physical vault.

                  Step 7: Defend

                  Stay alert. Vigilance and careful behavior online (e.g., using secure sites denoted by https in the URL) offer a strong line of defense against hacking.

                  亚洲AV天堂综合在线观看