Could you identify a hack to your system?

A hack refers to any breach of your IT system where by your data is compromised.

The following are examples of hacks you or business may encounter

adapted from the following article Click here


A malware hack used to record the strokes of your keyboard potentially giving away email IDs and passwords

Denial of Service (DoS)

A technique where the hacker can flood your site with requests, consequently overloading and shutting down your server or site

Waterhole Attacks

A targeted attack whereby a site frequently used by the individual or organisation is altered and infected with Malware

Fake WAP

Software can be used to fake a Wireless Access Point so that when an individual logs on their data becomes compromised


This attack does not harm the system but the hacker can watch and wait for the information they require


This type of attack is also targeted; the hacker can identify the sites most frequented by the individual or group and sends similar links to spoof sites to try and deceive the target into clicking on the link


Malicious software transmitted by the hacker to gain access to data


The User Interface is hijacked and hidden so the user is duped into using an interface created by the hacker to glean the users data

Cookie theft

Once your cookies are accessed the hacker can gain access to logins and passwords on your browser

Bait and Switch

The hacker runs a malicious file believed to be authentic by the user. This allows the hacker the full run of your machine

Identifying a hack

Victims of cyber-crime rarely realise they have been hacked until it is too late. The following are signs to watch out for

adapted from the following article Click here

  • Unwanted browser toolbars
  • Redirected internet searches
  • Frequent and random pop-ups
  • Contacts receive suspicious emails from your account
  • Change of password
  • Unexpected software installs
  • Ghost mouse – your mouse moves by itself seeming to make intentional selections
  • Anti-virus software or task manager has been disabled and fails to restart
  • Your bank account is missing money
  • You get calls from stores claiming non-payment of goods

How to respond to a hack

If you think you have been hacked it is important not to panic, the wrong move can potentially exacerbate the situation and make it more difficult to investigate. If you are using a company device it is vital you report the suspected attack immediately.

If you are unable to get immediate help it is advised to disconnect the device from the internet and switch to hibernation mode, it is important that you do not switch off the device

Unless you are tech savvy and a confident user it is recommended that your device is assessed by a local IT professional.

It is advisable to have a Standard Operating Procedure in place so that your business is prepared to handle any cyber-security threats. It is also important that employees are aware of potential threats, their consequences and how to avoid them.

The following link contains some good tips on how best to avoid an online security breach

Click here


Should you report a cyber-crime

Many people don’t report incidents of cyber-crime, however, it is important to do so.

When incidents go unreported it becomes difficult for cases to be built against the responsible criminals. The Garda Bureau of Fraud Investigation is the relevant body to contact

Click here for contact details

From May 2018 it will be compulsory to report incidents of data breach under the General Data Protection Regulation Act. These cases should be reported to the Irish Data Protection Commissioner

Click here for contact details


If you have any questions regarding cyber-security solutions for your business

Get in touch with our expert consultants at Solveit

Leave a Reply