Have you been hacked? Follow this seven-step checklist ASAP


I always feel sympathy when I hear about hackers breaking into someone’s computer. I felt terrible when Phillis from Orlando Beach, FL, called the show and said hackers stole $150,000 from her brother’s PC. If you’ve ever been hacked, you know how scary it is.

That’s why I put together this hacking survival guide. Follow this seven-step checklist if you’re unfortunate enough to fall victim to this cybercrime.

1. Change all passwords

Update all of your passwords — especially your email and financial accounts. Every password you keep is a potential entry point for a hacker.

Here are five ways to make a strong password:

  1. Make them longer than 14 characters: More is better, but be mindful of character limits.
  2. Use a mix of uppercase and lowercase letters: Mix them up to make your password more complex.
  3. Throw in numbers: Avoid birth dates. They’re far too easy to figure out.
  4. Don’t forget the symbols: Throw in asterisks, parentheses, exclamation marks, commas, question marks and anything else you can think of.
  5. Make it a secret phrase: Use something like, “I went to the spa and saw the moon.” Replace some of the letters with numbers and symbols.

Need more advice? Use these 10 tips to secure your accounts with strong passwords.

Don’t forget to use unique passwords for every online account. It can be challenging to remember them all. A password manager can help keep track of your changes. Here’s everything you need to know about these important security tools.

2. Enable two-factor authentication (2FA) after you’ve been hacked

2FA makes you prove your identity whenever you log in. For example, when you try to access your online banking account, you’ll need to enter your credentials and a security code sent by text. Type the code into your device to prove your identity.

Unfortunately, some hackers can intercept 2FA texts. That’s why I recommend authenticator apps. They provide one-time-only codes that refresh every 30 seconds. Since they’re time-sensitive, they’re…

Source…