If your computer or an online account has been hacked, the hacker may change the password to something they know. If that happens, your regular password won’t work. Most online accounts will send you an email when your password has been changed. However, if the hacker changed the email associated with the account to an email they control, you wouldn’t get the email notification.

You typically have to verify your identity. This may involve providing answers to a series of security questions, scanning a valid ID, or taking a selfie while holding a card with a specific word or phrase on it.

You can typically call the regular customer service number. When the customer service agent looks at your billing pattern, it should be obvious that something’s not right. For example, if you normally pay $50 a month for data, and then you get a bill for $900, you likely won’t be liable for that expense. The company will investigate the situation and figure out what happened.

For example, if you had a method of payment saved on the hacked account, the hackers may have been able to access that credit card or bank account. Notify your bank or credit card company, if necessary, and ask to have a fraud alert put on your account. If you’ve used the same password for other online accounts, change the password on those as well. Make sure every password you use is unique. Turn on 2-factor identification, if the option is available. In addition to entering a password, you will have to enter a code sent to you through text or email before you can access your account. This adds an extra layer of security for you.

You may also have frequent pop-ups on your computer or unfamiliar icons on your desktop or start menu. Hackers may also delete or move files. If your computer won’t open a file because it’s corrupted, that may be another sign that you’ve been hacked.

If you find a suspicious file on your computer, don’t try to delete it on your own. It likely has built-in protections to keep it from being deleted, and attempting to remove it may make the problem worse.

For example, in the US you would contact the FBI or the US Secret Service. You typically can find the right agency through a simple online search for “report hacking” with the name of your country. If you can’t find the agency this way, call the non-emergency number for your local law enforcement agency and ask them who you should contact.

If you ran a virus scan on your computer, the information in the scan report may be of interest to law enforcement. Take note of any file names or other information that might lead investigators to the hackers. If you have any theories as to how the hackers accessed your system, provide those to law enforcement as well. For example, spyware or malware may have come from an email attachment you downloaded. Write down approximate dates and times that you noticed problems with your computer or other evidence of hacking. If you were contacted by the hackers, keep the complete email – there may be information in the header that can help identify or locate the hackers.

For example, if you live in the US you can report hackers to the FBI using the Internet Crime Complaint Center at https://www. ic3. gov/default. aspx. You also have the option of going in person to a local FBI office. You may have the option of filing your report anonymously. However, it’s usually better to identify yourself and provide contact information. That way investigators can get in touch with you if they have questions or need additional information from you.

You might also want to file a report with the local police if you know the person who hacked you or if you know they live nearby. It’s generally better to go to the local police precinct in person or call the non-emergency line. Even serious online threats seldom rise to the level of an emergency.

If the agency is able to identify and apprehend the hackers, you may receive a call from a prosecutor with questions about your report or any evidence you submitted.

Many operating systems are available for free. Make sure you’re downloading from the manufacturer directly, or from another reliable source. Check for a lock icon in the address bar to verify that the website is secure before you download.

Run a virus scan at least once a week, or set up your antivirus program to do this automatically.

Change your passwords at least twice a year. You may want to change the passwords for financial accounts more often.

For example, if you get a social media message from a friend asking you for money, contact the friend directly and ask them about the message. It could be someone who has hacked their account and is now attempting to extort money from you.

Keep your computers and electronic devices turned off at night unless you’re using them. You may also want to turn off your wireless network when you’re not using it, such as when you’re not at home or at night when you’re sleeping.

Most newer routers have intuitive interfaces or mobile phone apps that allow you to easily monitor your network and update security settings.