You are now hacked! What’s Next? (Watch 4 Free)

You are now hackable
Windows machines can be hijacked if you’re in the wrong place at wrong time. Microsoft has provided many tools in Windows that allow administrators and power users to analyze systems and determine if and how they have been compromised. Many of us don’t even consider this! We’ll show you how Windows can do such an analysis. There are also free tools available from the Security community that will help you get out of the chaos. This session is mandatory for anyone who has ever been infected by a virus on their computer.
Slides available for download
sessions/teched/eu/2013/WCA-B220.pptx

Are you worried that your computer has been compromised? Three quick steps to follow
Hacking can happen, no matter how careful you are about keeping sensitive information private.
It’s often in surprising ways. Your information can be accessed via your social media accounts, your laptop or computer and even connected devices such as Nest, Alexa and Google Home.
If it’s online-based, you are at risk of being hacked. There are concrete ways to protect yourself.
Step 1: Change your passwords
This is important as hackers may seek out weak passwords to gain access to larger networks.
For sensitive information-sensitive accounts and devices, ensure your password is strong and unique. It won’t work to add your mother’s maidenname to your birthday. LastPass is a good password manager that can quickly generate difficult-to-crack passwords.
Step 2: Secure your log-in process
After your passwords have been secured, ensure that your log-ins remain secure.
Two-factor authentication is a feature that most accounts have. This extra measure is used to verify that you are the person who has access to the account.
Two-factor authentication works by the following:
While you’re at the same time, you might want certain third parties to be unable to access your information on sites like Facebook, Twitter, and Google. To disable these authorizations, follow the steps in each website’s settings section. This will ensure that the information you share is secure.
Step 3: Reach out to people who can assist
There are several key steps you can take immediately if you suspect that your financial information was fraudulently obtained.
These include contacting:
It is a serious matter to deal with potential hacking. You can avoid it by being aware and following your instincts.