End-user Computer Security/Main content/What to do when you discover your computer has been hacked

From Wikibooks, open books for an open world
Jump to navigation Jump to search
Electronic-security artwork (lock & circuit-board patterns).jpg
=𓆉

End-user Computer Security
Inexpensive security

for   

individuals
sole traders
small businesses

What to do when you discover your computer has been hackedExtlink for End-user Computer Security book -4.svg  /  Chapter 9
[edit]

⬆ Up-vote section | What to do when you discover your computer has been hacked (chapter 9) ⬇ Down-vote section | What to do when you discover your computer has been hacked (chapter 9)

Backing-upExtlink for End-user Computer Security book -B5.svg filesExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Backing-up files (under «What to do when you discover your computer has been hacked») ⬇ Down-vote section | Backing-up files (under «What to do when you discover your computer has been hacked»)

If it is ever discovered that a computer has been hacked,

🛡 i) restarting the computer into some kind of safe-mode with WiFi, Bluetooth, NFC and other things deactivated, might be a secure way to get access to your files so that you can back them up.
🛡 ii) However, likely more secure than this is to run off the same computer, another operating system installation using a physical drive that was never previously used with the computer, or a live DVD/CD, and then access your files through the other OS installation or live DVD/CD so that you can back them up.
🛡 iii) Even more secure, is to take the drive out containing your files, interface with the drive using a completely different computer that is running a live DVD/CD, and then access your files through the live DVD/CD in order to back them up.

When to change digital passwords and keys?[edit]

⬆ Up-vote section | When to change digital passwords and keys? (under «What to do when you discover your computer has been hacked») ⬇ Down-vote section | When to change digital passwords and keys? (under «What to do when you discover your computer has been hacked»)

You may be tempted to change such security credentials straight-away after discovering that you have been hacked. However, could it be better to wait until you are sure that your system is secure rather than changing such credentials using an unsecure system?

Further information[edit]

⬆ Up-vote section | Further information (under «What to do when you discover your computer has been hacked») ⬇ Down-vote section | Further information (under «What to do when you discover your computer has been hacked»)

The National Cyber Security Centre for the UK (NCSC) outlines steps to be urgently taken when you’ve discovered you’ve been infected with malware. Also, see here for their guide for small businesses on response and recovery from cyberattacks.


Previous chapter: chapter 8, entitled 'Broad security principles'

Chapter 8
Broad security principles
Go to page for contents, index, and foreword

Contents, Index, Foreword

Chapter 10
Miscellaneous notes
Next chapter: chapter 10, entitled 'Miscellaneous notes'