What To Do If You Have Been Hacked

Mini Easy Guide: What to Do If You Are a Victim of Cybercrime

Examples and What to Do:

Unexpected changes in settings:

  • Example: Your device’s wallpaper changes on its own, or your default browser is switched to an unknown one.
  • What to do: Check your device or account settings. If you haven’t made any changes, reset them to their original state and update your account passwords.

Messages or posts sent from your accounts without your knowledge:

  • Example: You notice posts on your Facebook or messages sent to your contacts that you didn’t send.
  • What to do: Immediately change your account password and enable two-factor authentication. Also, check for apps connected to your account.

Apps or programs you don’t recall downloading:

  • Example: Apps like "Cleaner" or optimization tools appear on your phone without your consent.
  • What to do: Uninstall unknown applications and review the permissions granted to apps or programs on your device.

Increase in mobile data usage or bandwidth without a clear reason:

  • Example: Your data plan depletes quickly, even though you haven’t downloaded anything.
  • What to do: Check your device’s data usage settings to identify which applications are consuming the most data.
  • Remove suspicious applications.

Your device is slower than usual, freezes, or restarts unexpectedly:

  • Example: Your phone or computer freezes constantly or shuts down and restarts without any apparent reason.
  • What to do: Perform a full scan using antivirus or antimalware software. If the problem persists, consider restoring the system to its factory settings. (Consult someone if you’re not sure how to do this.)

Pop-ups or invasive ads appear even when you’re not browsing:

  • Example: Ads appear without opening a browser, even while using other apps.
  • What to do: Check your browser’s extensions or installed apps and remove unknown ones. Install an ad blocker or antivirus software that detects malware.

Antivirus or security software alerts show deactivation without your consent:

  • Example: You receive a notification that your antivirus or firewall has been deactivated without your input.
  • What to do: Reactivate the security software immediately and run a full scan. Change the passwords for your accounts and check for malicious software with a reliable antivirus.

What else to do? Additional measures:

  • Keep the operating system and apps updated on PCs and mobile devices.
  • Download apps only from trusted sources (e.g., Google Play, App Store, etc.).
  • Avoid public Wi-Fi networks or use a VPN for greater security, this applies to laptops and phones. Use Warp by Cloudflare 1.1.1.1.

Examples and What to Do

Strange Notifications

Logins from unknown locations

Example: You receive a notification from your Google account stating someone logged in from an unusual location.

What to do: Check your account’s active sessions, and if necessary, log out from all sessions. Change your password and enable two-factor authentication (2FA).

Unrequested password change alerts

Example: You receive an email saying a password change was requested for your email account.

What to do: If you didn’t request the change, use the "forgot password" option to reset it to a more secure password that combines letters, numbers, and special characters. Ensure your account is protected to prevent the requester from guessing it.

Device Behavior Changes

Battery drains faster than usual

Example: Your mobile device’s battery depletes rapidly, even with minimal use.

What to do: Check for background apps that might be using excessive resources. Uninstall any suspicious applications.

Storage appears full for no apparent reason

Example: Your device shows full storage capacity, even though you haven’t saved many files.

What to do:

  • Review your device folders for unknown or suspicious files.
  • Use a cleaning tool to remove unnecessary files. (Be cautious with deep-cleaning tools as they may delete important photos or files. Always confirm the type or level of cleaning you need.)
  • Run a full scan using reliable antivirus software to detect and eliminate potential threats.
  • If you find files you cannot identify or delete, consider seeking professional technical support.

Other Indicators

Redirection to unwanted websites

Example: Your browser redirects you to strange websites that you haven’t visited or searched for.

What to do:

  • Check your browser extensions and remove any you don’t recognize.
  • Reset your browser settings to their default state to eliminate any malicious configurations.
  • Perform a scan using reliable security software to detect and remove threats.

For advanced users:

  • Verify the "hosts" file on your system to ensure there are no unauthorized modifications redirecting your web traffic.
    • Windows: macOS/Linux: The file is located at/etc/hosts. (Ensure you create a backup before making any changes.)
    • macOS/Linux: /etc/hosts (Create a backup before making changes.)
  • Change DNS settings to trusted servers such as Google (8.8.8.8 and 8.8.4.4) or Cloudflare (1.1.1.1).
  • Update your browser and operating system to the latest versions to protect against known vulnerabilities.
  • Check your Wi-Fi network by changing your router’s password and verifying no unauthorized devices are connected.

Laptop cameras or microphones activated without your intervention

Example: The camera’s light turns on even though you didn’t activate it.

What to do:

  • Revoke app permissions for camera and microphone access.
  • Use security software to ensure there are no spyware programs on your device.

Browsing history includes websites you haven’t visited

Example: Your browser history shows visits to websites you’ve never accessed.

Steps to Protect Your Home Banking Account

Signs of Hacking or Credential Theft

Before taking action, identify the signs that your home banking
account has been compromised:

Unrecognized Access

  • Example: You notice transactions you didn’t authorize or logins from unusual locations.

Suspicious Notifications

  • Example: You receive messages about changes to your account (e.g., password changes or confirmation messages) that you didn’t request.

Strange Activity in the Home Banking App

  • Example: The app displays unusual transactions, such as amounts you didn’t transfer.

What to Do if You Suspect Your Account Has Been Hacked

On Your Mobile Device

  • Disconnect from the Internet: Disable Wi-Fi and mobile data to prevent the attacker from maintaining access.
  • Review Your Transactions: Open your home banking app on another secure device (preferably with Warp by Cloudflare 1.1.1.1 installed) and check for unauthorized transactions. Take note of suspicious transactions (amount, date, recipient, etc.).
  • Change Your Password Immediately: If you can still access your account, update your password to a strong one with uppercase and lowercase letters, numbers, and symbols. If access is lost, use your bank’s recovery system to reset it.
  • Enable Two-Factor Authentication (2FA): If you haven’t done so yet, enable two-factor authentication (2FA) on your banking app. This adds an extra layer of security, as you will need an
    additional code sent to your phone or email to access your
    account.
  • Check Installed Apps: Look for any suspicious apps you don’t remember installing. If found, uninstall them and run an antivirus scan.
  • Contact Your Bank: Report fraudulent activity and request your account to be blocked or temporarily frozen. Always use official communication channels (phone numbers from the bank’s website, not links from emails).

On Your Laptop or Desktop

  • Disconnect from the Internet: Turn off Wi-Fi or unplug the Ethernet cable to cut off potential attacker access.
  • Check Your Transactions: Access your home banking account using Warp by Cloudflare and review recent transactions. Note any you don’t recognize.
  • Change Your Password: Update your password from your computer using a strong combination. If you cannot log in, follow your bank’s password recovery procedure.
  • Review Browser Extensions: Check for and remove any suspicious or malicious extensions. Clear your browsing history and cookies.
  • Scan for Malware: Run a full system scan with reliable antivirus or antimalware software. Update your operating system and browser to prevent security vulnerabilities.
  • Perform a full scan with a reliable antivirus to detect and remove any malware that may have been installed on your laptop, such as Malwarebytes. (There is a free version available).
  • Change Passwords for Other Accounts: If you reuse the same password for other services (email, other banks, etc.), update them to prevent further breaches.
  • Contact Your Bank: Use the official website or customer service number to report suspicious transactions and request security measures.

Additional Preventive & Post-Hack Measures

  • Use Unique and Strong Passwords: Ensure all banking and email accounts have different, complex passwords.
  • Enable Two-Factor Authentication (2FA/MFA): Activate additional authentication layers wherever possible.
  • Keep Devices Updated: Regularly update operating systems, antivirus software, and applications to protect against known vulnerabilities.
  • Avoid Suspicious Links: Do not click on unverified links in emails, texts, or social media messages.
  • Be Cautious with Public Wi-Fi: Avoid using public networks for banking. If necessary, use a Virtual Private Network (VPN).
  • Uninstall Unused Apps: Remove old applications, especially those with unnecessary permissions.
  • Request Official Reports: Ask your bank for a detailed account statement to identify any unauthorized transactions.
  • Set Up Real-Time Alerts: Enable automatic notifications for transactions to receive immediate alerts on activity.
  • Educate Yourself on Common Scams: Learn about phishing tactics and never share personal or financial data through unverified channels.
  • Consider Changing Your Device: If you suspect your phone is compromised and cannot resolve the issue, use a clean device to access your account.
  • Enable Screen Lock: Use PINs, patterns, or biometric authentication (fingerprint, facial recognition) to prevent unauthorized access.

Use Warp by Cloudflare for Additional Security

  • Enhanced Privacy: Encrypts your internet traffic, protecting data from attackers, ISPs, and insecure public Wi-Fi networks.
  • Protection Against Spying: Prevents "Man-in-the-Middle" (MITM) attacks by blocking unauthorized tracking or interception of your data.
  • Improved Performance: Uses Cloudflare's global servers to optimize internet traffic routes, often improving browsing speed.

Warp by Cloudflare, along with security tools like Malwarebytes, can be installed on laptops, PCs, and mobile phones to enhance protection.

Signs of Hacking or Credential Theft

  • Emails You Didn’t Send – You find messages in your sent folder that you didn’t send.
  • Unrecognized Logins – You receive notifications of suspicious activity or logins from unknown locations.
  • Password Rejected – You cannot access your account, despite being sure your password is correct.
  • Changes in Settings – Unknown email forwarding rules, altered recovery addresses, or auto-reply messages appear without your authorization.
  • Alerts from Linked Accounts – Your social media, financial, or other services report unauthorized access attempts.
  • Messages from Your Contacts – Friends or family mention receiving strange emails from your address.

What to Do If You Suspect Hacking

On Your Mobile Device

  • Disconnect from the Network – Activate airplane mode to temporarily cut off internet access.
  • Change Your Email Password from Another Device – Use a computer or secure device to update your email password.
  • Check App Permissions – Go to your phone's settings and check which apps have access to your email. Revoke permissions from suspicious apps.
  • Scan Your Device – Install a reliable antivirus and run a full scan to detect malware or malicious apps.
  • Update the Operating System – Ensure you have the latest software version, as updates include security patches.
  • Unlink Your Account from the Device – If you suspect your phone is compromised, temporarily unlink your email account from the phone.

On Your Computer

  • Disconnect from the Internet – Turn off Wi-Fi or unplug the Ethernet cable to prevent further suspicious activity.
  • Change Your Email Password – Use another secure device to change your password.
  • Check Your Browsers
    • Remove suspicious extensions.
    • Ensure browser settings are secure.
    • Clear cookies and cache.
    • Verify if your browser has saved compromised passwords.
  • Use a Reliable Antivirus Program – Run a full system scan to detect viruses, trojans, or spyware.
  • Uninstall Unknown Programs – Go to your PC's installed programs list and remove anything suspicious.
  • Reset the System – If multiple signs of infection appear, consider restoring your computer to a previous state or performing a clean installation of the operating system.

Preventive and Post-Hack Measures

Preventive Measures

  • Use Secure and Unique Passwords – Combine letters, numbers, and symbols. Avoid reusing passwords across different services.
  • Enable Two-Step Authentication (2FA) – Add an extra layer of security.
  • Be Cautious with Phishing – Do not click on suspicious links or download files from unknown senders.
  • Regularly Update Your Devices – Install security updates for your operating system and applications.
  • Use Password Managers – Store passwords securely instead of writing them down in unsafe places.
  • Monitor Your Accounts Regularly – Periodically review account activity to spot unusual behavior.

Post-Hack Measures

  • Notify Your Contacts – Inform them that your email has been compromised and advise them to ignore suspicious messages.
  • Review Your Linked Accounts – Check all accounts linked to your email and update passwords to prevent further access.
  • Change Your Password Immediately – If you still have access, update your password to a stronger one.
  • Monitor Your Finances – If your email is linked to bank accounts, change passwords immediately and consider using a new email for financial services.
  • Change the Email Account If Necessary – If an attacker has full control (e.g., altered recovery settings), switch banking and other services to a new email.
  • Consult Experts – If the attack was severe, seek guidance from a cybersecurity specialist.
  • Create a Contingency Plan – Establish routines for backing up data and periodically evaluating device security.

A Simple Contingency Plan

1. Select a Reliable Backup Platform
  • Choose a platform that fits your needs and offers sufficient storage space.
  • Common options: Google Drive, OneDrive, Dropbox, etc.
  • If you prefer a physical backup, use external hard drives or USB flash drives.
2. Identify Important Data and Organize Your Files
  • Personal Documents – IDs, contracts, important records.
  • Photos, Videos, and Important Files
  • Work or Study Files
  • Store critical data in at least two different places, such as
    one copy in the cloud and another on an external hard drive.
    This reduces the risk of loss if one system fails.
3. Store Critical Data in Multiple Locations
  • Keep one copy in the cloud and another on an external hard drive.
4. Establish a Backup Routine
  • Automatic: Sync folders with cloud storage platforms.
  • Manual: If using physical storage, back up your files weekly or at least monthly.
  • Automatic: Configure automatic synchronization in your cloud platform. For example, Google Drive allows you to sync specific folders so they update automatically.
  • Manual: If you prefer copies on physical devices, back up your files once a week or at least once a month.
5. Protect Your Backups
  • Use secure passwords for cloud accounts.
  • Encrypt external drives or USB flash drives using tools like BitLocker or VeraCrypt (test encryption on a separate test folder before applying it to critical files).
  • Store credentials securely in a safe and private place.
6. Evaluate Security Periodically
  • Every 3–6 months, ensure backups are up to date and accessible.
  • Make sure devices storing backups are free of malware.
  • Use "Have I Been Pwned" to check if your accounts have been leaked in data breaches.

Have I Been Pwned: A Useful Security Tool

  • Check if Your Email Has Been Compromised – Visit Have I Been Pwned and enter your email.
  • Monitor Security Breaches – Get alerts when your email appears in data leaks.
  • Enhance Account Security – Change passwords and enable 2FA if your email has been exposed.

It is important to identify signs of hacking in time. Here’s how to detect
if your account has been compromised:

How to Know if You’ve Been Hacked?

Suspicious Messages on WhatsApp

Examples:

  • Your friends receive strange messages from your WhatsApp account, such as unknown links, incoherent messages, or money requests.
  • Someone sends text or multimedia messages from your WhatsApp account without your knowledge.

What to Do:

  • Do not download or open unknown files, whether images, videos, audio, or documents, as they could be malware or fraud attempts.
  • Delete WhatsApp from your device, reinstall it from the official store (Google Play or App Store), and verify your number to close any active sessions on other devices.
  • Inform your contacts so they are alert and avoid falling for fraud or clicking on malicious links.

Unexpected Changes

Examples:

  • Your passwords have been changed without your authorization.
  • Important data in your accounts, such as settings or sent and received photos, has been altered for fraudulent purposes.
  • Your profile picture has been changed without your knowledge.

What to Do:

  • Restore your account settings to their original state.
  • Change the password for accessing your phone.
  • Enable two-factor authentication (2FA) for greater security.

Access Blocked

Example:

  • You cannot access your account, and a message appears demanding money (ransomware) to unlock it.

What to Do:

  • Disconnect your device from the Internet immediately.
  • Do not pay the ransom or follow the criminals' instructions—paying makes you an easy target for further ransom demands.
  • Seek help from a cybersecurity expert to remove the malware and regain access.
  • "For this activity and the other suggestions outlined here, make sure you
    fully understand the steps and their potential impact. If you're unsure or
    uncomfortable proceeding, seek help from a professional who can explain how
    to do it correctly to avoid unintended mistakes."

Steps to Recover Your WhatsApp Account

Verify your phone number on WhatsApp:
  • Open WhatsApp on your device.
  • Enter your phone number and follow the instructions to receive a verification code.
  • If the attacker changed your number, select "Can't receive the code?" and follow WhatsApp’s instructions.
Request help from WhatsApp:
  • If you cannot access your account, visit WhatsApp's website and look for the option to contact technical support.
  • Explain your situation so they can assist you in regaining access.
Secure your Google account if linked to WhatsApp:
  • If you use your Google account for backups or WhatsApp-related functions, change its password from a secure device.
  • This prevents unauthorized access and protects your backups and data.

Post-Recovery Security Measures

Change All Your Passwords

  • Update the passwords for all accounts linked to WhatsApp, such as your email or Google account.
  • Use long and secure passwords with a combination of uppercase and lowercase letters, numbers, and symbols.

Enable Two-Factor Authentication (2FA)

  • This extra layer of security helps prevent future hacks. Enable it on WhatsApp and all other accounts that support it.
Steps to Enable 2FA on WhatsApp:
  • Open WhatsApp and go to Settings (three dots in the top-right corner).
  • Select "Account", then "Two-step verification".
  • Tap "Enable" and choose a 6-digit PIN that only you know.
  • Add an optional email to help recover your account if you forget the PIN.
  • Complete the process, and 2FA will be activated.

Note: Enabling two-factor verification (2FA) on WhatsApp means that, in addition to your phone number, a 6-digit PIN will be required to set up the app on a new device. This ensures that if someone tries to access your chats, photos, videos, or audio files on another phone, they cannot do so without the PIN. Even if they have your number, the additional verification protects your data and keeps your account secure. Make sure to remember or securely store this 6-digit PIN.

Inform Your Contacts

  • Let your friends and family know that your account was hacked so they can be cautious of any suspicious messages or scam attempts.

Monitor Your Device Activity

  • After recovering your account, regularly review your device’s activity to detect any unusual behavior.

If you discover that your Facebook account has been hacked, it’s essential
to act quickly to protect your personal information, prevent the hacker
from gaining further control, and restore your account. Below is a step-by-step guide:

Signs of Hacking or Credential Theft

Before acting, identify the signs indicating your Facebook account may have
been compromised:
  • Unrecognized Access: Unusual activity, such as posts you didn’t make, settings changes, or messages sent without your authorization.
  • Suspicious Notifications: Password change alerts or login confirmation messages from unfamiliar devices or locations.
  • Phishing Emails: Emails from Facebook confirming changes you didn’t request, like an updated email linked to your account.

What to Do If You Suspect Your Facebook Account Has Been Hacked:

From Your Mobile Device:

  • Disconnect from the Internet: Turn off Wi-Fi and mobile data to prevent further access by the hacker.
  • Check Your Facebook Account: Log in from a secure device. If you can’t access it, use Facebook’s password recovery system. Take note of suspicious activities (messages, posts, profile changes, etc.).
  • Change Your Password Immediately: If you still have access, update your password. Use a strong combination of letters, numbers, and symbols. If you can’t log in, opt for account recovery using your linked email or phone number.
  • Enable Two-Factor Authentication (2FA): Activate 2FA for added security. It will require a verification code sent to your phone or email when logging in from new devices.
  • Review Connected Apps: Check apps with access to your Facebook account. Remove any unfamiliar or suspicious ones immediately.
  • Contact Facebook: If recovery is still an issue, reach Facebook support through its official page or use the “Help” option in the app.

From Your Laptop or Desktop:

  • Disconnect from the Internet: Disable your Internet connection to prevent continued unauthorized access.
  • Review Facebook Account Activities: Log in securely and check posts, messages, and recent logins. Note suspicious activity.
  • Update Your Password: Change your password immediately if you can still access the account. Otherwise, recover it via Facebook’s password recovery page.
  • Inspect Browser Extensions: Ensure no malicious extensions are installed. Remove anything suspicious.
  • Run a Security Scan on Your Computer: Use trusted antivirus software such as Malwarebytes to scan for and remove malware.
  • Update Other Important Account Passwords: If you use the same password for other services (e.g., email, banking), update those passwords immediately.
  • Contact Facebook: Inform Facebook of any suspicious activities and request account recovery if necessary.

Preventive Measures & Post-Hacking Actions:

After recovering your account or as a precaution, follow these recommendations:

  • Use unique, strong passwords for all social media and other services. Avoid reusing the same password across accounts.
  • Enable two-factor authentication (2FA) on all accounts, especially for social media and email.
  • Keep devices, antivirus software, and applications up to date to protect against known vulnerabilities.
  • Be cautious of suspicious links in emails, text messages, or social media. Hackers may try to trick you into revealing credentials.
  • Avoid using public Wi-Fi for accessing important accounts. If necessary, use a VPN (Virtual Private Network) for secure connections.

Utilize Privacy Apps Like Warp by Cloudflare:

  • Enhanced privacy: Encrypts traffic, preventing easy interception by hackers.
  • Protection against espionage: Secures data from man-in-the-middle attacks on public or insecure networks.
  • Improved performance: Optimizes browsing speed via Cloudflare's global servers.

Stay Calm and Act Quickly:

The key to resolving a hack is to act promptly but calmly. Following these steps will help you regain control of your Facebook account, protect personal information, and reduce the risk of future hacking attempts. If you're unsure or unable to recover access, don’t hesitate to contact a cybersecurity expert or Facebook support for additional assistance.

Google Drive

  • Security: Provides encryption in transit and at rest.
  • Features: Allows restoring previous versions of files.
  • Recommendation: Enable two-factor authentication (2FA) for greater protection.

Microsoft OneDrive

  • Security: Uses SSL/TLS encryption and encrypted storage.
  • Features: File recovery and ransomware detection.
  • Recommendation: Keep your devices updated and configure 2FA.

Dropbox

  • Security: Protects your files with AES 256-bit encryption, both at rest and in transit.
  • Features: Maintains a version history and allows recovery of deleted data for 30 days. (Longer in advanced plans).
  • Recommendation: Use the recent access review feature to detect anomalies.

iCloud

  • Security: End-to-end encryption for certain types of data.
  • Features: Ideal for Apple users due to its integration within the ecosystem.
  • Recommendation: Set up alerts for access from new devices.

Amazon S3 (Simple Storage Service) - For advanced users

  • Security: Advanced options like granular access control, encryption, and audits.
    • Granular access control: Through IAM (Identity and Access Management) policies and Access Control Lists (ACLs).
    • Encryption: Both at rest (using AWS-managed or custom keys) and in transit (TLS/SSL).
    • Audits: Tracks bucket activities with Amazon CloudTrail, providing a detailed log of access and changes for compliance and security monitoring.
  • Features: Best suited for advanced users or businesses.
  • While S3 is designed for businesses and advanced users, its
    flexibility and pay-as-you-go model also make it accessible
    for individuals or small businesses with basic needs.
  • Recommendation: Use secure passwords and monitor access logs. Enable multi-factor authentication (MFA) to safeguard AWS accounts.

Backblaze

  • Security: Offers encryption both at rest and during transfer.
  • Features: Specifically designed for cloud backups with a user-friendly interface.
  • Recommendation: Perfect for those looking for dedicated and reliable storage.

Additional Tips for Choosing a Backup and Restore Service:

  • Data Encryption: Ensure the service provides end-to-end encryption to protect your files during storage and transfer.
  • Two-Factor Authentication (2FA): Always enable it to add an extra layer of security to your account.
  • Activity Logs: Opt for services that allow you to monitor unauthorized access and suspicious activity.
  • Redundant Backup: If possible, store copies on more than one service for added security.
  • Privacy Policy: Review the provider's policies to ensure they respect the confidentiality of your data.

Note: A combination of local backups (external hard drives) and cloud backups is ideal to be prepared for any incident.

Google Drive

Steps to use Google Drive:

  • Create a Google account: If you don’t have one yet, go to google.com and register with your email and password.
  • Access Google Drive: Go to Google Drive and log in with your Google account credentials.
  • Upload files or folders: Click on the “+ New” button in the upper-left corner. Choose “Upload file” to upload a document, image, or other file. Or select “Upload folder” to save multiple items at once.
  • Enable two-factor authentication (2FA): Go to your Google account Security settings. Look for the “2-Step Verification” section and enable it by following the instructions.
  • Share or download files: To share, right-click on a file and select “Share.” Enter the recipient's email and choose permissions (view or edit). To download, right-click on the file and select “Download.”

Additional Note: Google Drive also syncs with your phone or computer if you
install the app. This makes it easier to access your files anytime.

Microsoft OneDrive

Steps to use OneDrive:

  • Create a Microsoft account: If you don’t have one, go to the Microsoft website and register with your email and password.
  • Download the OneDrive app: Visit the Microsoft website or your device's app store to install it.
  • Log in and upload files: Open the app and sign in with your Microsoft account. Drag and drop files into the OneDrive folder, or select “Upload” to save them manually.
  • Recover files from the Recycle Bin: If you delete a file by mistake, go to the “Recycle Bin” section in OneDrive. Select the file and press “Restore” to recover it.

Additional Note: OneDrive also enables teamwork, as it allows you to share
files and collaborate with others in real time.

Dropbox

Steps to use Dropbox:

  • Create an account: Go to the Dropbox website and sign up with your email.
  • Download the app: Install the Dropbox application on your computer, tablet, or phone.
  • Upload your files: Drag and drop files (like photos or documents) into the Dropbox folder on your device. Everything placed here is automatically saved to the cloud.
  • Use version history: If you accidentally delete something or need a previous version of a file, use Dropbox's version history feature to recover it.

Additional Note: Dropbox automatically syncs your files across all your
devices. You only need an Internet connection.

iCloud

Steps to use iCloud:

  • Activate iCloud: Go to the settings on your Apple device (such as an iPhone, iPad, or Mac) and ensure you are signed in with your Apple ID.
  • Enable iCloud Drive: Navigate to the iCloud settings and turn on the “iCloud Drive” option to store files in the cloud.
  • Upload files: Use the Files app on your device to move documents, photos, or other files to iCloud Drive.
  • Access from anywhere: You can open your files from iCloud.com in any browser or from another Apple device connected to your account.

Additional Note: iCloud also automatically backs up your photos, contacts,
and more if configured. It is not enabled by default.

Amazon S3

Steps to use Amazon S3:

  • Create an AWS account: Visit the Amazon Web Services (AWS) website and sign up for an account.
  • Set up a bucket: A "bucket" is a storage container in Amazon S3 where your files are saved. Create a bucket to organize and store your files.
  • Upload files: Add files to your bucket and configure permissions to control who can access them.
  • Encrypt your data: Enable encryption to enhance the security of your files during storage and transfer.
  • Download files when needed: Access and download your files anytime through the AWS Management Console or APIs.

Additional Note: Amazon S3 is designed for advanced users and businesses. While it has a steeper learning curve, it offers robust security and
scalability.

Backblaze

Steps to use Backblaze:

  • Create an account: Sign up on the Backblaze website.
  • Install the backup app: Download the application on your computer and follow the instructions to install it.
  • Set up automatic backup: Choose which folders or files you want to back up, and let Backblaze automatically create copies in the cloud.
  • Recover files: If you lose anything, go to the Backblaze control panel on their website and download what you need.

Additional Note: Backblaze also offers a physical data shipment option, where your files can be sent to you on a hard drive if you need to recover
large amounts of data quickly.

Backup on Android:

Google Drive (default option):

  • Open Settings: Go to the Settings app on your Android phone (gear icon).
  • Find "Google" or "Backup & Reset": This will depend on the version of Android you have. Look for an option mentioning Backup.
  • Enable "Google One Backup": This allows your data (contacts, calendars, app settings, etc.) to be automatically saved to your Google account.
  • Select the Google account: Make sure you're connected to the Google account where you want to store your data.
  • Perform the backup: Tap Start Backup Now to save your data.

Do You Need to Download the App or Is It Pre-Configured?

  • You don't need to download the Google Drive app:

    • The backup functionality to Google Drive is already integrated into most Android devices.

    • However, if you want to manage files directly from Google Drive, you can download the app from the Play Store. This is optional.

Advanced Backup Options (Cloud & Local)

Third-Party Apps

  • Samsung Smart Switch: If you have a Samsung device, you can use this app to back up your data to your computer or another cloud.

  • Backup & Restore: Another tool you can download from the Play Store if you want more control over your backups.

Local Backup (Without Cloud)

  • Connect your device to a computer using a USB cable.

  • Manually transfer your important photos, videos, and documents.

Backup on Apple:

Using iCloud (Default Option):

  • Open Settings: Look for the Settings app on your iPhone (gear icon).
  • Tap your name: It appears at the top of the screen next to your photo (if you’ve added one).
  • Select "iCloud" and then "iCloud Backup": Within the iCloud menu, find the iCloud Backup option. Toggle the switch to enable automatic backups.
  • Choose what to back up: Select the data you want to include in the backup, such as photos, contacts, messages, apps, etc.
  • Start a manual backup (optional): If you want to back up immediately, tap Back Up Now.

Using iTunes or Finder to make a local backup on your computer:

  • Connect your iPhone to the computer: Use a compatible USB cable to connect your device to a Mac or PC.
  • Open iTunes or Finder: On a Mac with macOS Catalina or later, use Finder. On a Windows PC or a Mac with macOS Mojave or earlier, open iTunes.
  • Select your device: You’ll see your iPhone listed in the Finder sidebar or in the upper-left corner of iTunes. Click to select it.
  • Set up the backup: In the backup section, select "This computer" if you want to save the backup locally. If you wish to include passwords, health data, or other sensitive information, check the box for "Encrypt backup."
  • Click "Back Up Now": This will start the backup process. The duration will depend on the amount of data on your iPhone.

Detailed Steps to Set Up and Use iCloud

1. Open Settings

  • Look for the Settings app on your iPhone (gear icon).

2. Tap Your Name

  • Your name appears at the top of the screen next to your photo (if added).

3. Select "iCloud" and Then "iCloud Backup"

  • Within the iCloud menu, find the iCloud Backup option.

  • Toggle the switch to enable automatic backups.

  • The iPhone will regularly back up when connected to Wi-Fi, charging, and with enough iCloud storage.

4. Choose What to Back Up

  • Select the data you want to include, such as photos, contacts, messages, and apps.

  • This is useful if you have limited iCloud storage since free accounts only offer 5 GB.

5. Start a Manual Backup (Optional)

  • If you want to back up immediately, tap Back Up Now.

  • The process duration depends on the amount of data and your Wi-Fi speed.

Do You Need to Download Anything to Use iCloud?

  • No, iCloud is already integrated into all Apple devices.

  • You only need to:

    • Set up your iCloud account (if not already done).

    • Ensure you have enough storage in your account.

Using iTunes or Finder for a Local Backup

This option allows you to create a full backup of your iPhone on your computer, including data that iCloud doesn’t always back up (e.g., non-purchased music or specific app settings).

Detailed Steps

1. Connect Your iPhone to the Computer

  • Use a compatible USB cable to connect your device to a Mac or PC.

2. Open iTunes or Finder

  • On macOS Catalina or later: Use Finder (since iTunes is no longer available).

  • On Windows or macOS Mojave and earlier: Open iTunes.

3. Select Your Device

  • Your iPhone will appear in the Finder sidebar or in the upper-left corner of iTunes. Click to select it.

4. Set Up the Backup

  • In the backup section, select "This computer" to save the backup locally.

  • To include passwords, health data, or other sensitive information, check the box for "Encrypt backup."

5. Click "Back Up Now"

  • This starts the backup process. The time required depends on the amount of data on your iPhone.

What Do You Need to Use iTunes or Finder?

For Finder (Mac):

  • Finder is built into Macs with macOS Catalina or later—no installation required.

For iTunes (Windows):

  • If you're using Windows, you need to download and install iTunes from Apple's official website or the Microsoft Store.

  • On macOS Mojave or earlier, iTunes comes preinstalled.

Additional Notes About iTunes

  • On Windows: iTunes remains functional and is useful for creating full backups or syncing content.

  • Limitations: While reliable, iTunes has an outdated design and lacks newer features. It may also have compatibility issues with older Windows versions.

  • Benefit: This method allows you to manually manage backups and sync content, ideal for those who want full control over their data.

Key Differences Between iCloud and iTunes/Finder

AspectiCloudiTunes (Windows) / Finder (Mac)
Where data is storedIn the cloud (5 GB free limit)On your computer (limited by hard drive space)
Requires Internet?Yes, for backup and restorationNo, works locally once connected
What’s included?Selected data (photos, contacts, apps)Full backup, including non-purchased music & specific settings
CompatibilityAvailable on all Apple devicesiTunes works on Windows, Finder is on macOS Catalina+
Ease of useVery easy—automatic backups in the backgroundRequires manual connection and backup process
SpeedDepends on Internet speedFaster, since no Internet is needed
SecurityProtected by Apple ID encryption in the cloudCan be encrypted via iTunes/Finder (optional)
CostFree up to 5 GB; extra storage starts at $0.99/monthFree (only requires space on your drive)

Conclusion

  • iCloud is ideal for automatic, hassle-free backups.

  • iTunes/Finder is best if you need a complete backup and prefer not to rely on the Internet.

  • No downloads are required for iCloud or Finder, but Windows users must install iTunes.

  • Both methods are reliable—choose based on whether you prefer cloud storage or local backup.

Recommendation:

Always check Apple’s official guides to stay updated on best practices: Apple Support.
Prevention is the best way to protect your information.

If working from home and suspecting your network has been compromised,
consider these additional steps: 

Signs of Network Compromise

  • Unusual activity spikes during off-hours
  • Unexpected changes in router or network device settings

Immediate Actions

  • Disconnect suspicious devices
  • Restart the router and update its firmware to patch vulnerabilities
  • Segment the network to separate work and personal connections for better security

Restoring Data from Backups

  • Access your backup service (e.g., Google Drive, iCloud)
  • Locate the latest available backup
  • Start the restoration process and verify that your data is fully recovered and functional

Beware of Unsolicited Help Offers

Cybercriminals may attempt to exploit the situation by impersonating
legitimate companies or support personnel

  • Avoid clicking on links in suspicious emails, texts, or calls
  • Use tools like VirusTotal to analyze questionable emails or files
  • Verify the sender's email address to ensure it’s not fraudulent

Preparedness and Vigilance Are Key

Handling a hack requires swift but careful action. Following these steps can minimize damage and help regain control of your accounts and devices. Being prepared and ready to act is the best way to safeguard your digital life.