Share

tweet



How to recognize if your info has been compromised

Given the staggering volume of personal information that is kept in digital storage, data-theft has become a very real danger for people in all walks of life. And while anyone with an internet connection may fall prey to cybercrime, it is of special concern for business owners, whose organizations are often specifically and strategically targeted. Perhaps most dangerous of all is the fact that often times, these crimes occur completely without being noticed, resulting in potentially months’ worth of damage. Knowing how to recognize the signs of data theft can help you repair the damage before it gets out of hand. Here are seven possible indicators that your data has been compromised.

1. Persistent Odd Computer Behaviors

If someone has hacked into your computer system, then changes might have been made along the way to obfuscate your security, eliminate evidence of unauthorized access, or provide backdoors for later. This is all going to cause odd computer behaviors. You might notice cursors moving uncontrollably, persistent connection problems, or even random disk writing. If your system is behaving strangely, contact IT so that you can quickly determine the cause and correct it.

2. Strange Messages Received by Friends or Clients

If data is stolen, it is often used as a springboard for criminals to impersonate trusted sources and access more data from others. Phishing or other messages could be sent to your friends, clients, or others listed in the data. Those people might receive emails that look as if they are from you or your business asking for personal information or money. If this happens, then your info has been hacked and is now in the possession of criminals.

3. Inquiries on Your Credit Report

If the information stolen contained your financial data, then a criminal might attempt to open up new accounts in your name. Criminals might attempt to get credit cards, loans, or access to bank accounts under your name. This is a difficult sign to miss, because random inquiries are going to start appearing on your credit report showing that the person is applying for some type of financial account. This is why it is important to check your credit report often for strange behavior.

4. Unwanted Applications or Processes

A common tactic that hackers use is to install a Trojan horse or dummy program on your system after getting inside. This could be a keylogger, or something else that will allow unfettered remote access to your system in the future. Check your systems for unwanted applications or processes that keep appearing. They might even look similar to standard system processes. The best way to avoid this is through strong business security measures, such as regular auditing from professionals, and using modern defensive software that exceeds industry standards. Investing in business security for your network and computers may seem like an unnecessary expense, but it will pay for itself in secured data.

5. Unexplained Calls, Notifications, or Emails

If you own a business and your system has become compromised, then you might start receiving a large number of unexplained calls, notifications, or emails. These are likely going to be from vendors, other businesses, or collection agencies. Someone might be attempting to use the financial data to make purchases in the name of your business. Upon non-payment for services or products, those other vendors are going to aggressively pursue your business. Be aware of any pattern of incoming calls or notifications that seem to indicate unauthorized products or services were ordered under your business name.

This is why physical security is important as well. Using a video system such as Pro-Vigil you can ensure that no unwanted individuals enter your business locations. A well known business hacker wrote a book entitled “Social Engineering” where he details how he was able to hack and enter business databases through physical means instead of digital techniques.

6. Corrupted Files or Databases

Stealing data from a system is not generally as easy as it sounds, especially when you have tight business security. One of the results of a sloppy or careless hacker could be corrupted files or databases. You might become unable to open key documents or files. Entire databases or portions of databases could be corrupted so that you can no longer access the information inside. These are early signs that there might have been a major data breach.

7. Personal or Private Information Changes

Someone who has compromised your system and stolen data might attempt to start changing your personal or private information in the hope that you will not notice for some time. This could mean unexpected password changes. You might start to see that your email address, physical address, or phone numbers are starting to change in various places like business accounts or credit card accounts. If you see this happening, then it is likely that someone managed to steal your information.

About the Author

Lee Ying has over 10 years experience in the tech and security industry. He currently writes for various websites, if you would like to contact him you can find him on LinkedIn: https://www.linkedin.com/pub/lee-ying/9a/18b/238. Follow him on Twitter @LeeYing101