What to Do After Being Hacked

A laptop with a red screen. On the red screen is an image of a bug.
 

Kalamazoo, MI | July 30, 2025

Realizing you’ve been hacked can be frightening. From breached emails to compromised devices, being hacked can feel confusing and violating. That said, what you do next can make a difference.

If you’ve been hacked, then time is of the essence. By following this list of countermeasures, you may stop the hack in its tracks or even reverse the damage.

If you’ve been hacked and need a solution now, follow our hack response checklist below and immediately contact your IT provider.

🛡️ 5-Step Fast Hack Response Checklist

  • Don’t Panic.
    Many hackers want you to feel scared in order to pressure you into revealing more information.
  • Make Sure You Were Actually Hacked.
    Some hackers try to trick you into thinking you’re already hacked to get you to do what they want. If you received a message or call saying that you’ve been hacked, check for any suspicious signs before giving them sensitive information.
  • Disconnect Hacked Devices from the Internet.
    You limit a hacker’s power over your device when you cut off their internet connection to it.
  • Change Compromised Passwords.
    Change the passwords for any accounts that have already been hacked; then, change the passwords of related accounts with similar passwords.
  • Contact Your Managed Security Provider.
    Your IT provider should provide managed security services. Contact them immediately so they can stop viruses or hackers in their tracks and restore system security.

1. Don’t Panic

It’s essential to respond quickly to a hack—but it’s even more important to stay calm. For many hackers, the goal isn’t to hack your device, but to hack your mind. In the cybersecurity world, we call this process social engineering.

Fight Social Engineering and Scareware

Many hackers need you to panic in order to scare you into doing things you normally wouldn’t. Hackers know that when you’re scared, you’re more likely to look for immediate solutions; and that’s exactly that they want. This type of social engineering is called a scareware attack.

In a scareware attack, you might receive messages that pretend you’re already hacked, even when you aren’t. Then, they’ll say you can stop the attack by entering your personal information. But getting that personal information is their true goal, everything else is just pretext.

So before making any changes to your accounts, ask yourself: have I actually been hacked?

If you’ve received any of the messages below, you may not have been hacked yet:

  • Fake Virus Alerts. A website or popup claiming, “Your computer is infected!”  or “Your files are under attack!” This scareware attack almost as old as the internet itself—but it still works.

  • Fake Tech Support Calls or Emails. Some hackers will call, email, or text you pretending to be from a popular tech company (Microsoft, Apple, Google) or antivirus software (Norton, McAfee, Bitdefender). They’ll tell you your account has been hacked, and that you need to give them your account information to fix it.

  • Fake Login Screens. If you’ve clicked on a suspicious link, you may have been redirected to a login page that says you need to enter your account information to “secure” your account.


Cybersecurity Tip: You may not need expensive antivirus software. For most individual users, Microsoft Defender Antivirus (which comes free with Windows) offers excellent protection. Paid tools like Norton or McAfee often underdeliver for their price, especially when you're working with a managed security provider like Omega.


2. Disconnect Hacked Devices from the Internet

If your device has been hacked, then immediately disconnect from the internet.

Hackers that infiltrate your device require an internet connection to maintain control.

Desktop Computer: Unplug the ethernet cable. If your computer is connected via Wi-Fi, disable it. In your computer settings, search “Wi-Fi” and toggle it off.

Laptop: Turn on Airplane Mode. On Windows, click the network icon in the  bottom-right corner of your task bar and select the airplane icon. If you’re on Mac, just turn off the Wi-Fi manually by searching “Wi-Fi” in the upper-right menu bar.

Phone: Turn on Airplane Mode. This will instantly disable both Wi-Fi and cellular data.


3. Change Your Passwords

If you still have access to your accounts, then immediately change your passwords.

Hackers know that most users use the same password or similar passwords across different accounts. To prevent further damage, immediately change your passwords for vulnerable accounts, especially for:

  • Email

  • Banking Accounts

  • Work-related platforms (Teams, Google Workspace, BambooHR)

  • Any other accounts linked to the hacked one

Below, we’ve created a password generator that will instantly create a strong password you can use. After the hack is resolved, feel free to change your passwords to something easier for you to remember (as long as it’s still unique and strong).


4. Contact Your IT Provider Immediately

IT providers, like us at Omega, specialize in managed security services. When you contact us, our trained professionals will work side by side with you to isolate infected devices, investigate the source, and restore your systems to a safe state.

Don’t wait to get professional help. During a hack, every second counts. Click the button below to reach out to our professionals about a hack or call us at (269) 762-8404.


Prevent Hacks with a Managed Security Service

Hacks happen—and not just to the little guy.

Just last week, a women-only dating advice app called Tea was breached by hackers, leaking the names, pictures, and even addresses of thousands of women online. The fallout is in headlines everywhere, and proves just how devastating a data breach can be.

Don’t be like Tea.

For businesses of all sizes, the best cure for a hack is an ounce of prevention. That’s why we at Omega Computer Services provide our customers with advanced security measures such as:

  • 256-Bit Encryption

  • 24/7 Security and Support

  • Anti-Virus Protection

  • Industry-Specific Cybersecurity Compliance

Click here to contact us about creating a data security plan for your organization today!


About the Author:

Stevie A.

As Content & Education Specialist at Omega, Stevie specializes in making technical topics approachable for everyone. With 4 years of experience as an award-winning tutor, and nearly 3 years of experience in tech as a writer and web designer, Stevie brings educational depth and digital expertise to the role. Stevie’s passion is for analyzing big ideas and sharing them with others in simple and engaging ways. Outside of work, you can find Stevie reading, attending local theater, and singing at Shakespeare’s karaoke night.