Savy savy.jpg
IFPA award ifpaaward.jpg

Irritations to Important Issues

Irritations to Important Issues computer-hacked.jpg

Editor’s Note: In September’s column the tech consultants at POST Computer Systems of Wilbraham, MA, talk about how to tell if your computer has been hacked, and what to do if your machine – and information – have been compromised.

 

By Kate Thresher and The Team  at POST Computers
prime@pocosys.com

In the past several articles, we have been discussing ways to keep yourself safe online and not fall victim to the most common scams. Unfortunately, sometimes even the most careful users can find themselves in a tough spot.

In this article, we will be looking into some indications of computer infections and some of the first and most important steps to take if you feel as though you may have gotten scammed.

Basic computer infections

Most of the time, computer infections stop at your computer and attack its performance only. In the case of these “normal” computer infections, you may notice obscure and random pop ups, unresponsive web browsers, and general slowness of the machine. Only on rare occasions do these computer infections come with keystroke loggers, password hackers, and remote software putting your personal information at risk.

Another common computer infection comes by way of browser “add-ons,” also called extensions. These extensions are known to greatly reduce the performance of your computer.

If you find yourself suffering through one or some of these problems, there may be an infection of your computer that you didn’t know about. If you think that you may be infected, bring your computer to a professional to remove malware, adware, and viruses that may be the culprit of a bogged down machine. As previously mentioned, most of the times these infections are nothing but irritating, but we never recommend taking that risk – keep your gambling at MGM!

A more serious hack

If you find yourself in a situation where you have reason to believe that your personal information could be at risk, assume that the computer is no longer safe to use. If you received a scam call, someone was allowed remote access into your computer, or your banking information had been compromised, do not continue to use the computer.

The first step is always to shut down your computer and contact your financial institutions using the phone numbers located on the back of your credit and debit cards. DO NOT look up the phone numbers online. Inform your banks that you have reason to believe that your accounts are compromised due to computer infections, and ask them to put a temporary hold or flag on your account. In the situation that the scammer attempts to withdraw money from your account or charge you with a bogus charge, your bank will be able to stop it.

The second step is to bring your computer to a professional to have any viruses or remote software removed. Sometimes the bad guys will hide their malware by naming it something that appears to be harmless. Professionals will know what to look for and how to go about removing it.

Post-hack protection

After your computer gets a clean bill of health, the next step to securing your information is changing your login passwords. Everything from online banking sites to Netflix should be on the list.

One of the most important things to change is your email password. If the scammer got ahold of your email password, they could reset any password that you change. If you need help with changing your passwords, just ask. Senior centers, community learning centers, computer repair stores, and your bank will often help you if needed.

Taking it one step further

Depending on what information you feel was compromised, you may want to reach out to the Federal Trade Commission (FTC). This organization allows you to request free credit monitoring and flagging for a period of time, varying based on what information was affected. If your Social Security Number ended up in the hands of someone who should not have had it, the FTC will put a flag on your SSN so that if anyone tries to open another line of credit or request benefits using your identification, they will be stopped and you will be notified. The FTC also has a plethora of resources for getting compensation if you qualify, getting help, and straightening out the potential mess that scammers can cause.

Preventative measure are always the best for keeping yourself safe online, but the next best thing is knowing what to do in case you find yourself “caught.” As always, if you have any questions or comments, please feel free to email us at prime@pocosys.com.

POST Computer Systems has been serving the Western Mass. community since 1992. Started in a basement in Wilbraham, the company continues to grow year after year thanks to the strength of their service department and the continued support from the local community.

If you have any questions or concerns, or to request a future Prime article topic, please reach out to the crew at POST Computer Systems by emailing: prime@pocosys.com