Yellowstone Computing
(715)-669-6136
  • Home
  • Services
  • Support
  • Contact
  • Blog
  • About
  • Reviews
  • Repairs

How to Tell if You've Been Hacked

10/25/2018

 
Picture
Being hacked is the single biggest fear of most computer users.  Many believe the first sign of strange behavior or errors on their PC is a sign that hackers have taken control.  But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs?  What does being hacked really look like?

There is an important distinction to make between being hacked by a person and being infected with a virus or malware. Virus software and malware are automated processes designed to damage your system, steal your data, or both.  There are of course ways that we can defeat these processes, but what if we are instead hacked by an individual?

Logins Not Working
One of the first steps a hacker might take would be to change the computers passwords.  By doing so, not only do they ensure future access to the account, they prevent you from accessing the system to stop them. For the hacker, this is a crucial step that keeps them in control.  With this in mind, we always want to make sure to keep on top of our own login details and how often we change them. 

Security Emails or Text Messages from Online Services
Many services track which device and location you logged into your account from last.  If your account is accessed from a new device or a different country it might trigger an automated email or text to ask if this new login is your own.

If you have logged in using a new computer, tablet, or phone; an email that asks "hey, is this you?" need not be cause for alarm.  If you haven't, it may be time to investigate further. This service is an important part of information security. It may be a key first step to identify someone else gaining access to your account.

Bank Accounts Missing Money or Strange Transactions
Most commonly today, hackers commit crimes to steal money. The end goal for hackers is typically to profit from their crimes by taking money from people online. It always pays to keep a regular eye on your financial transactions to make sure you know what money is coming and going from your account. You may see a large sum missing where hackers have attempted to take as much as they can in a single transaction. Alternatively, small, hard to notice transactions may appear.  These often account for small purchases where attackers have tested the details they have to make sure they work.

Sudden Loss of Cellular Connectivity
Network interruption is a symptom that few people expect but occurs commonly when hackers attack. Many banks and online services use a security feature known as Two-factor authentication.  To do this they send a short code to your phone or an app when you log in.  Two-factor authentication is ideal in most cases and a great boost to security. 

Hackers can try to work around this by calling your mobile service provider to report your phone as lost or stolen.  During this call, they will request your phone number be transferred to a new sim card that they control. When your bank sends its regular two-factor authentication code to the number registered, it goes instead to the hacker who may be able to log in.  From your perspective phone service will simply stop working.

Keeping Vigilant and Maintaining Security
These are only some of the modern techniques that hackers can try to use to gain access to your accounts.  It pays to be extra vigilant and pay close attention to the signs and signals that indicate you may have been hacked.
​
If you suspect that you might have been hacked, or would like help to prevent hackers in future, give us at 715-255-0325 call and we'll improve your security. 

Comments are closed.

    Yellowstone Computing

    To read about us, click here!

    Archives

    December 2021
    September 2021
    August 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    November 2016
    October 2016
    December 2015
    September 2015
    July 2015
    May 2015
    April 2015
    March 2015
    February 2015
    January 2015
    December 2014
    November 2014
    October 2014
    September 2014
    August 2014
    July 2014
    June 2014
    May 2014
    April 2014

    Categories

    All

    RSS Feed

Visit Us!

What Our Clients Are Saying

Joe is really in tune with what our business needs are... what a great guy with amazing skills... - Grassland Veterinary Service

Yellowstone Computing goes above and beyond for their customers! Joe is very knowledgeable and will go the extra mile to make sure his customers not only get what they asked for but also makes sure they are taken care of for many years to come! Between the great business services they provide and their involvement in the Thorp Chamber I'd highly recommend doing business with Yellowstone Computing! Whether you are an individual looking for computer or other technology help or a large employer who needs to either supplement your current IT support or completely outsource it Yellowstone Computing should be one of your first calls! - Justin Z.