Loading
Don't panic. Follow these steps immediately to limit the damage, secure your accounts, and get your system back under your control.
Get Emergency IT Help NowThe very first thing you need to do is isolate your computer from the network. This prevents the attacker from continuing to access your system, stealing more data, or spreading to other devices on your network.
Understanding the type of attack helps determine your next steps. Different attacks require different responses. Here are the most common types and their telltale signs.
Your files are encrypted and a message demands payment for the decryption key.
An attacker has remote control of your computer and can see everything you do.
Your email, banking, or social media accounts have been taken over by an attacker.
Malicious software is silently recording your keystrokes and activity.
Using a different, trusted device such as your phone or another computer, begin securing your most critical accounts. Prioritize in this order: email, banking, then everything else.
While some minor infections can be handled on your own, most real hacking incidents require professional help. Attempting to clean a compromised system yourself can make things worse, destroy forensic evidence, or leave backdoors that the attacker can use to get back in later.
Once your system is clean and your accounts are secured, take these steps to dramatically reduce your risk of being hacked again.
Our on-demand IT support team can help you identify the attack, secure your accounts, clean your system, and get you back up and running. Don't wait — every minute counts when your computer has been compromised.
Get On-Demand IT SupportOne email per month with our best articles. No spam.