What Happens When You Get Hacked

Table of Contents

Getting hacked is one of the things you often hear in cyber security. According to a 2018 report, 73% of businesses are not ready to respond to a cyber attack.

That means getting hacked is now a matter of when, not if.

But it doesn’t have to come to that.

There are a lot of things you can do to protect yourself from getting hacked. You have to equip yourself with basic cyber security terminologies. Then, when you’re familiar, dive right in into our non-technical guide to protecting your business online.

But you may be asking…

What Happens When You Get Hacked

Getting hacked can mean a lot of things for different people. That’s why a lot of people still don’t take their online security seriously.

In this article, we’ve broken it down according to the levels of severity/effect on the victim.

Below are the five levels of hacking and what you can do to prevent it from happening.

Level 1: Harmless Snooping

The first level of hacking is when someone gains access to your data or information and does nothing about it.

For example, someone behind you at the train is ‘reading’ your email at the same time as you. Or someone who heard a private conversation you had with your spouse. Or a person who visited your office and saw some documents lying around…

This level doesn’t do any harm because the unauthorized person doesn’t do anything with the information. They just kept it to themselves and went about their regular day. Maybe they just used it as an interesting conversation over dinner with their spouse later that day.

How to prevent level 1 hacking

This level won’t cause much harm, but if the person has some evil intentions, then it’s worth taking extra precautions.

If you’re worried about someone snooping around reading your phone or your computer in a cafe, the best way to avoid that is to position yourself with your back against the wall. That way, no one can see what’s on your screen.

Or if that’s not possible, use one of those screen filters that block viewing from certain angles. Meaning, only the person who is directly in front can see what’s on the screen.

Still can’t visualize this? Next time you go to the ATM, step a little to the left/right and try looking at it from the side instead of the front. You should not see anything on the screen. It’s going to be the same thing but for your devices.

Level 2: The Prank

The second level of hacking is when your data is used against you but in a harmless, light-hearted way. You know, the one you just laugh and tell stories about later.

Imagine drinking out with your buddies. You tell stories. You laugh. After a while, you go to the bathroom. Then, when you come back, you notice everyone chuckling. You keep asking why and they won’t tell you. You let it go.

Then, you check your phone. You saw Facebook has a ton of notifications. When you looked at it, everyone at the table suddenly burst into laughter. You then looked at it and one of your buddies posted something.

No harm done. Just your drunk buddies playing a prank on you.

How to prevent level 2 hacking

If you haven’t already, add a passcode to your devices. Make it a habit to lock it before leaving it — whether that’s your phone or your computer.

Your password is useless if the device is already open.

For Mac users running on the latest OS (Mojave), simply press ‘command + ctrl + Q’ at the same time to lock your screen. If you’re using Windows 10, just press the ‘windows button + L’ to lock your screen.

And this goes without saying, if it’s portable enough, like your phone or tablet, and you’re in a public place like a cafe, please don’t leave it at the table when you go to the restroom, or order your drink.

Level 3: Fraud

Level 3 hacking is when the information accessed/stolen is used against you. This is the typical hacking you hear on the news where the hacker used the credit card of another person, or through other methods such as phishing or ransomware.

Remember, 70% of small and medium businesses have been targeted by a cyber attack. So, don’t take this for granted.

How to prevent level 3 hacking

General rules for protecting yourself online applies here:

  • Don’t open emails/links from someone you don’t know
  • Use strong and unique passwords
  • Use a multi-factor authentication
  • Use a VPN
  • Don’t connect to public Wi-Fis (if possible)

Remember that technology such as antivirus software can only protect you to an extent. You also have to do your part.

Level 4: Breach

Level 4 hacking goes beyond financial harm. Usually, the victim’s reputation takes a hit. It’s when other people are also affected in some way.

Remember the iCloud hacking of celebrities that happened before? This can also happen to you.

Or if you’re a business, this will be the data breaches where your customers’ sensitive information is leaked to the public — leading to the loss of trust of your customers.

How to prevent level 4 hacking

Preventing a level 4 hack starts at the top of your organization. You have to know who are the most common targets and how to spot them in their tracks.

Then, a cyber security policy is also key. You can’t expect your employees to know what you know, or even think about their online habits and how it may affect the entire organization. It’s up to you to communicate cyber security with your staff.

Level 5: Physical Harm

Level 5 hacking is the most severe type because it causes physical harm to people. Unlike money which you can earn back later or reputational harm which you can repair over time, this type of hacking can lead to irreversible consequences such as injuries or death.

This is the type that you often see on movies where hackers cause sudden blackouts leading to chaos or hack into your cars to control them.

Still not convinced? Here’s a list of cyber security attacks that happened already resulting to physical harm, including tampering of HVAC systems in a hospital and the main control software of a German plant that resulted to a physical blast.

How to prevent level 5 hacking

Preventing this level of hacking is similar to the ones described above. It takes just one mistake (a single infected USB thumb drive or an innocent click on an email) to allow hackers to get in your system.

If your organization doesn’t have the necessary skills or manpower to handle your cyber security, your best course of action is to hire an external IT partner to assess your current state and work together to ensure you are ready for a cyber attack.

Conclusion

There’s a lot you can do to protect yourself from getting hacked.

Remember, if something can connect to the internet, it can be hacked.

No technology is 100% hack-proof.

You (and your employees) are the last line of defence when it comes to not getting hacked.

So, the question is, are you ready when that happens?

Other People Also Viewed These Articles

Leave a Comment