Checklist hero image.jpeg

Cyber Attack Checklist

Many kiwi businesses, and people around the world fall victim to hacking attempts every day. Devices and accounts have become lucrative targets of online criminals and keeping yourself safe is an ongoing challenge. We have created this ultimate check-list highlighting some key actions to carry out should you, your colleagues, and/or your devices be affected by a cyber-attack.

Here are 8 Immediate actions to take in the event of a post-hacking situation:

icon-lock.gif

1. Change all your passwords:

A Data Breach Incident Report conducted by Verizon in 2018, revealed that 81% of data breaches are caused by compromised, weak, and re-used passwords. Cyber criminals use these accounts to reset passwords and get access to other accounts. Take the time now to reset your passwords, try to use unique passwords for each system you access. Read our Password Guide for recommendations and best practice.

icon-apps.gif

2. De-authorise apps:

De-authorise any apps that are authorised to access your Hotmail, Gmail, and Office 365 account settings. Hackers install unwanted apps that could potentially access your data even after you have changed your password. You can always add them back later.

icon-email.gif

3. Check E-Mail Rules:

Make sure your personal e-mail accounts do not have any un-wanted rules assigned in the Rules management option. E-mail can be deleted or shifted to a different folder without your knowledge, the hackers may have put these traps in place to remain hidden.

icon-two-factor.gif

4. Two-Factor Authenticator:

Add a two-factor authenticator to your personal accounts. This means you will receive a text or use a one-time code for access as well as provide your password. This can be setup on your other accounts such as e-mail, Dropbox, and Facebook.

icon-clients.gif

5. Secure your clients:

Recognise that your contact list has probably been downloaded, and now they all may receive spam/phishing emails from your attacker. Let everyone know what happened and to be on the lookout for strange e-mails supposedly coming from your e-mail address.

icon-support.gif

6. Call the right people:

If you lost out financially, and you have not already done so, talk to your bank and contact the police.

icon-anti-virus.gif

7. Update your anti-virus software:

Make sure your antivirus is all up-to-date and adjust the settings to scan automatically.

icon-updates.gif

8. Keep updates in check:

You can also protect your accounts by updating other software’s installed on your device(s), such as Adobe Reader and Java, for example, and make sure you are keeping up with all the latest windows updates as well.


What next?

There are additional steps we can take to make you a less attractive target, this includes setting up security technologies such as Two-Factor Authentication, enabling Conditional Access and enrolling your team in Online Security training campaigns. If you are interested in taking the next step to securing your business, then come and have a chat with one of our team members to discuss your business security.

Be smarter. Your security is only as strong as your weakest link.

Talk to us to evaluate your Business Security

Preferred contact