While you can’t eliminate the risk of being a victim of a cybercrime, you can control how you react if your identity, accounts, devices or information is compromised. Responding quickly and comprehensively limits the damage from being hacked, facilitates a rapid recovery and provides you with some needed peace of mind. Show So, let’s look at common cyber attack scenarios and the steps you should immediately take afterward. Stolen Social Security NumberScenario: After filing your taxes, you get a notice from the Internal Revenue Service stating your return was rejected because a return was already filed using your Social Security Number (SSN). This is a classic case of identity theft. What are your next steps?
Hacked Email AccountScenario: You start hearing from your contacts saying they’re getting emails from your account asking them to wire money to you, or maybe click on a suspicious link. Chances are a cybercriminal stole your email password and now has access to your account. So, what should you do?
Computer Infected by MalwareScenario: Strange ads start popping up on your computer. It’s running slower than normal, too. Could be that you fell prey to an online scam and clicked on a link you shouldn’t have, or perhaps downloaded content from an untrustworthy site. Malicious software has taken control of your machine. Now what?
Change the passwords on any online accounts used while your computer was infected. But, create the new passwords from a malware-free device – not your infected computer. Fraud with Credit CardsScenario: You notice several charges to your credit card from a surf shop in Venice Beach, California. Only problem? You live in Iowa and have never surfed a day in your life. It appears a cyberthief stole your credit card number and is on a shopping spree. What are your next steps?
Phone Number Hijacked or PortedScenario: Your cell phone suddenly stops working. You can’t text or make calls, or even receive messages. You may be the victim of a phone porting scam. You feel panicked. So much of your life is connected to that phone. What’s more, you have all of your financial accounts set up with multi-factor authentication, with a one-time passcode sent to you via SMS. This means the fraudster could intercept the passcode and possibly infiltrate your accounts. What should you do?
Getting Support after a Cyber AttackIt’s easy to feel overwhelmed, helpless or even violated after you’ve been hacked. But, taking immediate corrective measures can alleviate the damage following a breach, and allow you to feel back in control. Also, your Morgan Stanley Financial Advisor is prepared to assist you with securing your financial accounts and can direct you to other resources for additional help. |