How do I know if I've been hacked?

May 13, 2025
20 min read
your-money-is-mine-now-shot-hooded-computer-hacker-using-computer-dark

Cybersecurity is a critical issue for all internet users. This issue is even more critical when it involves confidential business data that may be highly sensitive. At the same time, technology is advancing daily, and with it, so are hackers who are taking advantage of these advances to orchestrate increasingly complex attacks.

That's why it's important to know how to recognize threats and attacks. In this article, we'll explain how to tell if your computer has been hacked, and what to do next.

10 clues to know if I've been hacked

If your computer has been hacked, you should be able to find some clues fairly easily. While the hacking may interfere with your normal activities, it doesn't necessarily make them impossible. Here are some clues that should alert you:

1. Constant pop-ups for websites that seem strange or unusual to you.

2. Your browser's home page looks different.

3. You notice the presence of browser tools (plug-ins for example) that you have not installed and that you are not familiar with.

4. Your browser makes unwanted redirects when you click on something.

5. You notice that your loved ones are receiving suspicious messages from you on social media and by email. You'll likely also receive posts that you didn't make yourself.

6. Your computer mouse moves strangely, selects and clicks without you wanting it to.

7. Your computer crashes on its own and you notice significant slowdowns.

8. You notice that unknown programs are launching on their own on your computer.

9. Your passwords no longer work and have been changed.

10. You notice suspicious transactions in your bank account.

What should I do if I get hacked?

Step 1: Isolate the computer

To prevent the hack from spreading through the network, it is essential to isolate the computer by disabling its network antenna if applicable, disconnecting the network cable and turning off the computer (with a note not to use it until repaired!).
While you can do all these tasks manually, many service providers, such as Nexxo, offer an automatic isolation tool in case of detected danger: this is called an EDR .

Step 2: Notify your bank

If you've noticed fraudulent transactions or suspect that an unauthorized person has access to your account, one of the first things you should do is notify your bank to prevent further fraudulent transactions.

Step 3: Notify your company's IT manager

If you have someone responsible for IT and cybersecurity within your company, alert them as soon as possible.
But in many small businesses, there's either no real IT manager or they have limited capabilities (material, financial). In these cases, they can quickly become overwhelmed by events. To avoid this type of situation, using IT outsourcing can be the best solution: you entrust your company's IT security to professionals whose core business is ensuring your comfort and IT security! This will avoid unpleasant surprises and also give you great peace of mind on a daily basis.

Step 4: Scan the computer

Have the computer where the hack occurred scanned to detect the problem and also to determine if there is a spyware on the computer. You can perform this scan with antivirus or antimalware software.

Step 5: Change all your passwords

EVERYONE! It is important that you change your old passwords on the accounts that were hacked, as well as on any accounts that use a password similar to the one that was hacked. Also change the passwords on accounts set up with the email address that was hacked. This step is especially important if your email address was hacked. Preferably, change them on another computer in case it has a spyware.

Finally, we suggest you choose complex passwords that you don't repeat, not even derivatives. If possible, also opt for two-factor authentication; this will further secure your accounts. You can also use a password manager to avoid getting lost.

In summary

Keep an eye out for any unusual behavior on your computer; these are key indicators of hacking. Pop-up windows, unusual homepages, moving mouse, etc. are all very telling clues. If you think you're a victim of hacking, you'll need to act quickly to limit the damage. To act quickly, IT outsourcing can be a preventative and proactive solution to ensure IT comfort and flexibility for small and medium-sized businesses.

About Nexxo

Nexxo Computer Solutions specializes in providing IT and technology services to Quebec businesses. Its mission is to offer Quebec companies IT services tailored to their needs. Acting as an external IT department, it handles all of a company's IT tasks, allowing it to focus on its business activities. It achieves this by collaborating closely with its clients and putting their interests at the center of its concerns.

Stay Ahead with Expert Insights

Subscribe to our newsletter for the latest tips and updates in the tech industry.