Some specific steps.
1) First avoid being hacked.
A) email related.
1) do not open attachments in emails that you do not know 100% who they are from and what it is.
2) even if you know who it is from, does not mean it is safe, were they sending you something expected.
3) asks for money by email, plea for help because of an emergency, cannot talk on phone for some reason is suspect
4) just receiving a request for help, or a suspect email with attachment that you do not open, will not infect you.
5) if there is a link to a web site, from a suspect source, yes clicking on the link and ending up on an unknown web site can infect you.
6) opening an attachment and even if you see nothing you could be infected.
B) Links to web sites.
1) never click on a link to a web site unless you are 100% sure where it will lead you. once you click on that link (you are not in Kansas anymore Dorothy)
meaning you are no longer in Davis either.
2) Links within a specific web site can take you somewhere that you will not know it is safe. you cannot trust website protection software, it does not always catch it.
C) Anti virus software or anti spy software.
1) this software will not protect you if you let someone remote in.
2) this software will not protect you if you click on a dangerous web site.
3) this software will not protect you if you open an attachment in an email.
D) Letting the stranger in, to help thru remote.
1) letting anyone remote in is dangerous on every level. they can get your browser saved passwords, they can get your emails, everything, tax returns etc.
2) they will use applications that are real remote access software, it is who you are letting in, not what software they are using.
3) you need to verify that who you are letting in remote, is from the place they say they are.
4) always look at where the email is from, what domain name to confirm who you are dealing with.
5) if any doubt do not let anyone remote in.
E) your email has been hacked.
1) friends are calling you saying received emails that you were in an accident, or a sick and need money.
2) this does not mean your computer has been hacked, usually
3) this means your email has been hacked
4) password to email has to be changed
5) then someone has to look thru the email account on line
6) look for vacation forwarding to an unknown email account.
7) look for rules set up to forward your email to either trust or an unknown email.
8) if your email has been hacked, realized they can look thru your sent emails and find passwords, SS numbers or any info that will gain them assess to your accounts.
2) Once you have been hacked.
A) if it just your online email account.
1) go thru email account look for rules, vacation forwarding remove all
2) change password asap
3) test email make sure you are receiving and sending,
4) send out individual emails letting friends and family know you are ok, to call or text to confirm
B) has your computer been hacked
1) has someone remote in,
2) all passwords have to been changed, if financial info exposed, monitor credit report, for loans taken out your name. contact banks, change account numbers login info.
3) computer has to be backed up, or recover from external back up, or cloud
4) computer has to be wiped clean, then clean install of os, apple os, or windows os, or Linux os.
5) then data reinstalled from safe source.
C) External hard drive, or cloud back up
1) if external hard drive is plugged in, it is exposed to hacking or virus.
2) if cloud is syncing it is exposed to virus or hacking if they remote in.
3) make sure there is hard back up, off line that is current.
4) financial software backed up to multiple flash drives, or external drives A/B to be safe.
D) Ransom ware, encryption software
1) if you are hit with ransom ware, turn all devices off asap.
2) ransom ware encrypts, if the computer is off, cannot encrypt more.
3) once files are encrypted, there is no way to remove encryption without paying ransom.
4) having current back up off line, will allow to reload os, after wiping systems, and you will avoid ransom.
5) if you turn off computers soon enough, data can be recovered, all but was encrypted.
6) if you have current off line back ups you never have to pay ransom, be prepared.
a short list of things to think about, you may not know it yes everyone has been attacked, by emails or phone calls or fishing sites, to win in an attack, do not bite on the bate,
do not allow someone to talk you into purchasing iTunes cards, or bitcoin to pay them. call someone if any doubt, just stop, and call a friend or family member if you have a doubt.