Secure Business

3 July 2020

You got hacked. Now what?

Today, everyone wants to protect their devices as best they can. However, even if you have installed an anti-virus, your devices may get hacked. How do you know if you were? What to do if was? Discover our practical advice on how to act quickly.

Hacking: identifying the signs

There is no exact method for determining if your device, be it a computer, tablet or smartphone, has been hacked. However, hackers often do leave behind traces. We have listed the most common of these for you.

1. For computers:
  • Your password no longer works
  • Your contacts receive spam from you
  • Your anti-virus indicates that your system has been infected
  • Your navigator redirects you to unsolicited websites, or your homepage has changed
  • A programme asks for authorization to make changes to your system when you are not currently conducting any updates
2. For mobile devices:
  • You see unauthorized charges on your invoice to premium numbers
  • Data appear inexplicably on your screen
  • The battery drains very quickly (more so than usual)
  • Applications you have not downloaded appear
3. For both types:
  • Accounts you have not created show up
  • Programmes are installed automatically
  • Applications constantly freeze

How to reduce risks quickly?

Take some simple actions quickly if you suspect hacking. Especially on a personal device. If you think your work computer has been hacked, it is best not to take action yourself. It is safer to report the concert to your employer by contacting the help desk or notifying your manager, for example.

1. Change your passwords

You should change all your passwords, both for your computers and your mobile devices. Of course you should make these changes from a safe and secure computer. Be sure to read our recommendations for creating passwords that are difficult to hack.

2. Follow your anti-virus

Generally speaking, you can follow the recommendations of your anti-virus. It will certainly tell you to quarantine, clean up or delete the compromised file.

3. Reinstall your operating system

This is a bit more complicated, but manufacturers generally give instruction in the manual they provided with the product or on their websites. Note: if you restore your device from a back-up, make sure that the back-up was not itself contaminated, for example by testing it with an up-to-date anti-virus.

Some older computers or phones no longer support recent updates. Their operating system therefore has security gaps that are no longer up to date. Continuing to use these devices will increase the risk of being hacked.

Good to know:

Whether you reinstall your system or buy a new device, be sure to carry out all updates. It is a good idea to enable automatic updates.

4. Make sure you back your work up regularly

The more often you back your work up, the better. Whatever the back-up method you choose, you always have to be sure to be able to recover your files.

What now?