{"id":58480,"date":"2018-10-26T08:56:53","date_gmt":"2018-10-26T15:56:53","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=58480"},"modified":"2024-05-20T12:19:32","modified_gmt":"2024-05-20T19:19:32","slug":"8-things-to-do-right-now-if-youve-been-hacked","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/","title":{"rendered":"8 Things to Do Right Now if You&#8217;ve Been Hacked"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58621\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/what-to-do-after-being-hacked.jpg\" alt=\"8 Things to Do Right Now if You\u2019ve Been Hacked\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/what-to-do-after-being-hacked.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/what-to-do-after-being-hacked-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/what-to-do-after-being-hacked-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You wake up in the morning and you read the news: Another major website or cloud service has been hacked. You yawn, make a cup of coffee, and then all of a sudden realize that you have an account there. Your email, photos, and personal data are now at risk. What do you do?<\/p>\n<p>Unfortunately, data breaches are a common occurrence. From the revelation that 500 million <a href=\"https:\/\/www.yahoo.com\/tech\/yahoo-says-least-500-million-accounts-hacked-2014-184049462--finance.html\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo user accounts were hacked<\/a>, to the illegal distribution of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/did-jennifer-lawrences-naked-photos-leak-out-because-she-told-the-truth\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jennifer Lawrence&#8217;s photos<\/a>\u00a0that had been stolen from her iCloud account, this sort of event is no longer a surprise.<\/p>\n<p>In some cases, millions of people&#8217;s accounts are compromised at once\u2014and you may be one of the many victims. So what do you do if this happens to you? Here are eight things you should do right away.<\/p>\n<h3 id=\"newpasswords\">1. Change Your\u00a0Passwords<\/h3>\n<p>The first thing you need to do right away is change your password on the service that has been hacked. This may be a single website, or, in the case of Apple&#8217;s iCloud or Google, this password may be the key that opens access to all sorts of personal data. Make sure <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" target=\"_blank\" rel=\"noopener noreferrer\">the new password is secure<\/a>; if your previous one wasn&#8217;t, take advantage of this warning to make sure the new one is harder to crack.<\/p>\n<p>If you were the hacking target, then you need to change passwords on all your accounts. Obviously, this doesn&#8217;t include random forums and websites where you&#8217;ve signed up for newsletters. But you need to reset your passwords for any account where you have entered financial data, or store personal data of any kind.<\/p>\n<h3 id=\"useapasswordmanager\">2. Use a Password Manager<\/h3>\n<p>The best password is one like this: <strong>JovUCB#2yVJ6Rk&amp;A<\/strong>. Or this: <strong>icing-3terminal-Sconce<\/strong>. But these are not easy to remember. If you use a password manager, you can create secure passwords for all your needs without having to remember them. The only password you need to recall is a single, very secure password that lets you access your <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">password manager<\/a>.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/password-generator.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-58486\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/password-generator.png\" alt=\"password-generator\" width=\"500\" height=\"532\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/password-generator.png 571w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/password-generator-141x150.png 141w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/password-generator-282x300.png 282w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>There are several password managers for Mac, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/5-must-have-mac-utilities-to-boost-your-productivity\/\" target=\"_blank\" rel=\"noopener noreferrer\">my favorite is 1Password<\/a> (see also our article about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">how to choose the right password manager for you<\/a>). Not only does it store your passwords, credit card numbers, bank account information, and more, but it can create passwords for you when you need to set up a new account. I used 1Password to create the two passwords in the paragraph above, using two different options: random characters or words.<\/p>\n<p>Using a password manager helps you use different passwords for different accounts. Since it can be hard to remember all the passwords you need, you may have defaulted to using something like &#8220;password123&#8221; for lots of accounts. Or you may be using a more secure password, but using it for all your accounts. Get out of that habit: With a password manager, you can create unique secure passwords for each of your accounts.<\/p>\n<p>There are lots of password management apps and solutions out there, and for obvious reasons, it&#8217;s important to choose one from a reputable developer. If you mainly use Apple devices, or at least an iPhone, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works\/\">iCloud Keychain<\/a> is one free password manager that may work for you. Alternatively, you could choose one of several\u00a0popular password managers that meet high standards of quality and reliability; we&#8217;ve reviewed a few of them <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">here<\/a>.<\/p>\n<p><em>See also:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"FvMmPFbmcG\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\">4 Best Password Managers in 2024: How to choose the right one for you<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;4 Best Password Managers in 2024: How to choose the right one for you&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/embed\/#?secret=FvMmPFbmcG\" data-secret=\"FvMmPFbmcG\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3 id=\"turnontwo-factorauthentication\">3. Turn on Two-Factor Authentication<\/h3>\n<p>Many services offer two-factor authentication, which lets you secure your account not only with a user name and password, but also with a device, usually your smartphone. Services such as iCloud, Google, Amazon, Dropbox, Facebook, Twitter, Instagram, and others, offer this feature. You should turn this on for every account where it is available. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\" rel=\"noopener noreferrer\">This article<\/a> gives you more information about two-factor authentication.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"peKq9Kqf6O\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\">Two-Factor Authentication: How It Works and Why You Should Use It<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Two-Factor Authentication: How It Works and Why You Should Use It&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/embed\/#?secret=peKq9Kqf6O\" data-secret=\"peKq9Kqf6O\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3 id=\"deleteanyreallysensitivedatafromthehackedaccount\">4. Delete Any Sensitive Data from the Hacked Account<\/h3>\n<p>It may already be too late, but just in case, delete any really sensitive data from the account that was hacked. Just because\u00a0someone has access to your account doesn&#8217;t mean they\u00a0have trawled through all your data or files yet, or they may not have copied everything. So if you&#8217;re worried about any important files, especially those that contain personal information, delete them immediately. This is especially the case for services like Dropbox, Google Drive, and iCloud Drive. If you store important files on these cloud services, clear out your folders now.<\/p>\n<h3 id=\"tellyourfriends\">5. Tell Your Friends<\/h3>\n<p>If your account gets hacked, it&#8217;s important that you tell your friends and family right away,\u00a0because a common scam is for people who have access to your email to get in touch with some of your contacts pretending to be you. The scammer may say that you are in some different country and were robbed, and that you need money. Since your friends will think that the emails are really coming from you, they may be inclined to send you money via Western Union, PayPal, or some other service.<\/p>\n<p>Also, a\u00a0hacker may make malicious posts on Facebook, Twitter, or other social media services in your name. Make sure your friends\u00a0know that these posts are not from you.<\/p>\n<h3 id=\"de-authorizeappsonfacebooktwittergoogleandothers\">6. De-Authorize Apps on Facebook, Twitter, Google,\u00a0etc.<\/h3>\n<p>Some social media services let you link apps to your account. These apps are able to post for you, as well as read and write information about your account. You may have authorized a number of apps to use Facebook or Twitter, but hackers may plant their own apps thinking that you may not notice, and use them at a later date.<a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps.png\"><img loading=\"lazy\" class=\"aligncenter wp-image-58489\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps.png\" alt=\"google-apps\" width=\"500\" height=\"481\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps.png 1451w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps-150x144.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps-300x289.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps-1024x985.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/google-apps-657x632.png 657w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Check the social media platforms you use and, if you don&#8217;t recognize any authorized apps, revoke their access. Use these links to check <a href=\"https:\/\/www.facebook.com\/settings?tab=applications\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/settings\/applications\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/security.google.com\/settings\/security\/permissions?hl=en&amp;pli=1\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>.<\/p>\n<h3 id=\"checkyourbankstatements\">7. Check Your Bank Statements<\/h3>\n<p>One of the main reasons why cybercriminals hack Internet accounts is to make money. If someone can get ahold of your credit card information, they will attempt to make purchases until that card is blocked. If they can get into your PayPal account, they will try to transfer money to an account they control.<\/p>\n<p>You should immediately alert your bank, or other financial institution, and if you think your credit card details have been compromised, have your bank cancel the card. But keep your eyes on your bank accounts just in case. Charges don&#8217;t always appear immediately, so you may not see anything for a few days.<\/p>\n<h3 id=\"scanyourmac\">8. Scan Your Computer<\/h3>\n<p>If just your account was hacked\u2014not millions of people on a website or cloud service\u2014then you should be concerned about how this was done. It may have been <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/social-engineering\/\" rel=\"noopener noreferrer\">social engineering<\/a>: that&#8217;s when someone figures out how to pretend they are you and get access to your account. Often this involves people guessing the answers to your security questions.<\/p>\n<p>But it may also have been malware. Your computer may be infected. You should scan your Mac or PC and any external storage devices you have, such as hard drives or USB thumb drives, using trusted antivirus software. For macOS, we recommend VirusBarrier, which is part of <a href=\"https:\/\/www.intego.com\/buynow\">Intego&#8217;s Mac Premium Bundle<\/a>, and for Windows, we recommend <a href=\"https:\/\/www.intego.com\/intego-antivirus\">Intego Antivirus for Windows<\/a>.<\/p>\n<p>The reason should be fairly obvious: if there is malware on your computer, it may have intercepted keystrokes or copied files, and it may be able to do so again unless proper protections are in place.<\/p>\n<p>There&#8217;s a lot to do if you get hacked. But if you haven&#8217;t been hacked, you can learn a lot from these eight steps. Use the techniques described above to secure your accounts, making it harder for hackers to get access. Do it now, before you need to do it in a hurry!<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.<\/p>\n","protected":false},"author":46,"featured_media":58627,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[377,711,2494,3139],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Things to Do Right Now if You&#039;ve Been Hacked - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-26T15:56:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-20T19:19:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg\",\"width\":400,\"height\":260,\"caption\":\"What to Do if You've Been Hacked\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/\",\"name\":\"8 Things to Do Right Now if You've Been Hacked - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage\"},\"datePublished\":\"2018-10-26T15:56:53+00:00\",\"dateModified\":\"2024-05-20T19:19:32+00:00\",\"description\":\"Every year millions of people are hacked. If you have an account with a major website or cloud service that\\u2019s been hacked, here are 8 things you should do.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Things to Do Right Now if You&#8217;ve Been Hacked\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"8 Things to Do Right Now if You&#8217;ve Been Hacked\",\"datePublished\":\"2018-10-26T15:56:53+00:00\",\"dateModified\":\"2024-05-20T19:19:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage\"},\"wordCount\":1382,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg\",\"keywords\":[\"Hacked\",\"National Cyber Security Awareness Month (NCSAM)\",\"National Cybersecurity Awareness Month (NCSAM)\",\"NCSAM 2016\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/","og_locale":"en_US","og_type":"article","og_title":"8 Things to Do Right Now if You've Been Hacked - The Mac Security Blog","og_description":"Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-10-26T15:56:53+00:00","article_modified_time":"2024-05-20T19:19:32+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg","width":400,"height":260,"caption":"What to Do if You've Been Hacked"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/","name":"8 Things to Do Right Now if You've Been Hacked - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage"},"datePublished":"2018-10-26T15:56:53+00:00","dateModified":"2024-05-20T19:19:32+00:00","description":"Every year millions of people are hacked. If you have an account with a major website or cloud service that\u2019s been hacked, here are 8 things you should do.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"8 Things to Do Right Now if You&#8217;ve Been Hacked"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"8 Things to Do Right Now if You&#8217;ve Been Hacked","datePublished":"2018-10-26T15:56:53+00:00","dateModified":"2024-05-20T19:19:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#webpage"},"wordCount":1382,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg","keywords":["Hacked","National Cyber Security Awareness Month (NCSAM)","National Cybersecurity Awareness Month (NCSAM)","NCSAM 2016"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/8-things-to-do-right-now-if-youve-been-hacked\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/if-you-been-hacked.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fde","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58480"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58480"}],"version-history":[{"count":46,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58480\/revisions"}],"predecessor-version":[{"id":97713,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58480\/revisions\/97713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/58627"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}