Step1: Know the Signs Of A Cyber Breach
What Might a Cyber Breach Look Like?
- Locked Accounts or Password Changes
- You suddenly can’t access your email, systems, or cloud services — or passwords have been changed without your knowledge.
- Unusual System Slowness
- Your computer or network becomes sluggish for no clear reason, especially during off-peak hours.
- Strange Emails Sent from Your Account
- Contacts report receiving odd or suspicious messages from you — often with links or attachments.
- Missing, Renamed, or Encrypted Files
- Files disappear, are renamed, or are replaced with unreadable versions (often with ransom notes).
- Unexpected Pop-Ups or Warnings
- You see unfamiliar security alerts, software installation prompts, or system warnings.
- Login Alerts from Unknown Locations
- You get notifications about logins from places or devices you don’t recognize.
- Unusual Financial Activity
- Invoices are altered, payments are redirected, or bank accounts show unexpected transactions.
- New Software or Tools You Didn’t Install
- Programs appear on your system that you didn’t authorize — especially remote access tools.
- Disabled Security Features
- Your antivirus, firewall, or backup systems are turned off or not working properly.
- Staff Reporting Odd Behaviour
- Team members notice strange activity — like files moving, emails disappearing, or systems behaving oddly.
Step2: Simple Steps To Limit Cyber Breach Damage
- Disconnect devices from the Internet or turn off your internet connection
- If you are talking to someone else, disconnect with them and avoid further interaction
- Speak to trusted family members, just to get their input.
- Make Notes Of Times And Dates
- Check Your Bank and Email
- Don’t Post About It Online
- Start making a list of all of your internet accounts. Include email accounts and subscription services.
- Start digging out any data backups you may have to hand. You may need them.
- Don’t pay any ransom demands. You have no guarantee your data will be returned.
Step3: Reach Out To A Trusted IT Support Company. Avoid using email. You don’t know is this is being monitored.
Time is against you, so you need to act fast. Some cyber breaches are designed to intimidate or embarrass the victim in to not following up with help and support. As IT professionals, we are hear to help you and not judge. As a victim or crime, you may also want to follow this up with a crime agency after the initial triage.
Step4: Setting Expectations
At IT LifeRaft, our initial focus is on containment, to ensure the issue does not escalate. In some instances, we may not be able to reverse the actions of a cyber breach, such as a crypto locker attack.
Our checklist includes securing your hardware and then reclaiming access to accounts. We will need to work closely with you to ensure we close all the back doors. Every breach needs to be addressed on a case per case basis. This reclamation process may take a couple of hours and this may not guarantee a fix.
Step5: Securing Hardware With Our Agent
We first need to gain access to your hardware. Under our instruction, if you still have access to the device, we will direct you to our website to download our Remote Agent. Once installed, the agent will start running updates, install an antivirus product and allow us to start monitoring your device remotely for suspicious activity. Depending on the results, we can then advise if the device has been comprimised.
Step6: Securing Accounts
After we have secured access to your hardware, we will then focus on your accounts. We will ask you to reset passwords and assist you in setting up new passwords secured using modern authentication. This normally requires the use of a mobile phone. (Please ensure you have a mobile phone to hand)
Step7: Review & Post Cyber Breach Monitoring
Once we have reclaimed access to your accounts, we will need to monitor for suspicious activity. We suggest leaving the remote agent running. Once you have been compromised, it is more than likely you will be targeted again.
- Check to see if your details have been leaked to the dark web.
- Our recommendation: https://haveibeenpwned.com/
- Install a password manager.
- Our recommendation: https://keepass.info/
- Ensure all software is kept up to date
- Ensure all mobile devices are secured with an antivirus program. This included iPhones. Go to the Play store or Apple equivalent. Having some antivirus protection is better than none.
- Our recommendation: AVG Free
- As a victim, consider contacting action fraud or the government website to report the crime.
- Review all other accounts in use. Ensure all have unique passwords. Use a password manager to create new passwords.
- Check to ensure all your backups are working correctly.
Cyber threats are on the rise. If you have suffered from a Cyber Breach, we recommend you consider continuing with our Remote Agent Service. This goes above and beyond the protection of a simple antivirus program. We can actively monitor for suspicious activity on your hardware, keep your machine and software updated and provide a backup of your critical files (up-to 200Gb of offsite storage), if the worst were to happen.
🌍 Why Choose IT LifeRaft
- Local Expertise: Based in Whitchurch, we understand the needs of Shropshire businesses.
- Scalable Solutions: From start-ups to established firms, our services grow with you.
- Transparent Pricing: No hidden fees—just clear, tiered subscriptions.
- Proactive Support: We don’t just fix problems—we prevent them.
👉 Contact Us Today Online Bookings
👉 Explore Our Services Packages
Follow Us On