What Can You Do Once Your Device Has Been Hacked?

What Can You Do Once Your Device Has Been Hacked?

There are many symptoms that indicate a cyberattack. You could have strange new software installed on your computer, your system could be slowing down, or you suddenly have password problems. You might notice some website content that you didn’t publish.

If this is the case, it’s a fair possibility that your device has been hacked. Hackers access New Zealand devices thousands of times a year, costing millions to the econ costing millions to the economy.

And unlike scammers who contact and manipulate you into giving them money or information, you might not even know hackers have infiltrated your device.

This article runs through what you might want to do if you’ve been hacked and what you could do to prevent future attacks. Read on to find out who to contact and what safeguards you could implement next time. This article runs through what you might want to do if you’ve been hacked and what you could do to prevent any future attacks. Read on to find out who to contact and what safeguards you could put in place for next time.

How can devices be hacked?

Hackers use a variety of techniques to get into your device. They also target a variety of channels and applications, from your website and email to your network, social media, and financial accounts.

Attackers often profit from the most basic trait of human psychology: curiosity.

Phishing was the most common type of attack in New Zealand in the first quarter of 2022. These emails or texts mimic communication from a trusted source, trying to get unsuspecting victims to click an infected link or provide personal details.

An excellent way to avoid becoming a victim of a phishing attack is to look at the source of information and avoid clicking any suspicious links.

Passwords are another avenue hackers use to hack your device. If you or your employees use weak passwords, hackers can use various ways of getting into your account.

From brute force attacks where they spam guess your password to data-harvesting, where hackers get you to unwittingly give your password away, weak passwords are a hacker’s favourite mistake.  are another avenue hackers use to hack your device. If you or your employees use weak passwords, hackers can various ways of getting into your account. From brute force attacks where they spam guess your password to data-harvesting where hackers get you to unwittingly give your password away, weak passwords are a hacker’s favourite mistake.

Password managers and user authentication platforms can go a long way in reducing the likelihood of hackers gaining access through passwords.

Old software is another way in for hackers. Your devices have a variety of software that allows it to operate.

Hackers dedicate their time to exposing weaknesses in your systems, and software developers are constantly patching these weaknesses to avoid any easy ways in.

 This is why updating your software as soon as possible is crucial to avoiding an attack.

What could you do if you’ve been hacked?What you could do if you’ve been hacked

The issue that you are experiencing will determine how you deal with it. Although it is not easy to pinpoint the root cause, try notifying everyone that may be affected by what happened. This includes when and how it was noticed, the affected website and email accounts, as well as any other pertinent details.

Many resources are available to help you diagnose the problem if you don’t have IT experts on your team.

The following resources by Netsafe and the Computer Emergency Response Team (CERT NZ) are invaluable for New Zealand businesses that have been hacked:

Report an issue(external link) — CERT NZ

Help! My website has been hacked(external link) — Netsafe

Phishing(external link) — CERT NZ

Should you pay a ransom?

A common question is whether business owners should pay hackers demanding a ransom in exchange for stolen data or business information. CERT NZ recommends not paying because there is no guarantee that you will get your data back. A common question is whether business owners should pay hackers that are demanding a ransom in exchange for stolen data or business information. CERT NZ recommends NOT to pay because there is no guarantee that you will get your data back.

It will also likely put you on a hotlist for any future attacks. Visit CERT NZ if a ransomware attack is targeting you.

 Prevent an attack from happening again

After you’ve resolved the incident, it can be tempting to leave all thoughts about the security breach in the past.

However, to prevent future problems, it’s crucial to put some cyber security procedures in place.

 t can be tempting to leave all thoughts about the security breach in the past. However, to prevent future problems, it’s crucial to put some cyber security procedures in place.

Here are some of the top tips for reducing an attack:

  • Install antivirus software
  • Scan for viruses regularly
  • Limit your online personal information
  • Encrypt your data
  • Back up your data
  • Educate your employees about cyber safety

Safeguard your business just in case

While the steps above can help you reduce the chance of another security breach, they won’t eradicate the risk. Even the most cyber-safe small businesses can fall victim to hackers.

If hackers access your client’s personal information details or sensitive business information, you could be liable for the consequences.

From severe financial repercussions to the damage to your reputation and even business interruption from the time it takes to get back up and running, a cyberattack can be disastrous for small businesses.

This is where data protection insurance is crucial, as it could safeguard your business in these situations.  is crucial as it could safeguard your business in these situations.

Cyber Liability insurance is a type of data protection insurance which protects your business against both the legal costs and expenses related to cybercrime incidents.

Your coverage may generally include cover for expenses and restoration costs relating to the following:

  • Data breaches, including theft or loss of client information
  • Network Security Breaches
  • Business interruption costs
  • Forensic investigation into the cause or scope of a breach
  • Data recovery costs
  • Cyber Extortion
  • Crisis management costs (to protect or mitigate damage to your businesses reputation resulting from a cyber event)
  • Loss and Legal costs, including fines and penalties resulting from a third party claim for data or network security breach against your company

Don’t leave it until it’s too late. Sort out your Cyber Liability policy through this link.

The bottom line

Cyber attacks can be disastrous for small business owners. Knowing how to prevent one and deal with it if it occurs can help you get back to business.

This information is general only and does not take into account your objectives, financial situation or needs. It should not be relied upon as advice. As with any insurance, cover will be subject to the terms, conditions and exclusions contained in the policy wording. © 2022 BizCover Pty Limited, BizCover Limited is owned by BizCover Pty Ltd (ABN 68 127 707 975)


This information is general only and does not take into account your objectives, financial situation or needs. It should not be relied upon as advice. As with any insurance, cover will be subject to the terms, conditions and exclusions contained in the policy wording. © 2024 BizCover Limited.

Join 14,000 others in trusting BizCover

Breathe easy knowing you’re in good company

Similar Blogs