lutz logo
lutz logo
  • Services
  • News & Insights
  • About
  • Client Portal
Search
  • Services
  • Accounting
  • Advisory
  • Financial
  • M&A
  • Talent
  • Tech
  • Accounting Services
Services
  • Audit & Assurance
  • Client Advisory Services
  • Outsourced Accounting
  • Tax
  • Business Valuation
  • Litigation Support & Forensic
View All
Industries
  • Agribusiness
  • Construction
  • Family Office
  • Healthcare
  • Manufacturing & Distribution
  • Nonprofit
View All
News & Insights
Financial Access Checklist
Guide
Financial Access Checklist

Share this information with your spouse to assure you each have access to manage important financial tasks independently.

Read More
  • Advisory Services
Services
  • Accounting
  • Financial
  • M&A
  • Talent
  • Tech
View All
Resources
The Art of Budgeting
Recording
The Art of Budgeting + Smart Saving Strategies
Learn how to get your finances under control and increase your savings! Hear real-life examples and best practices to secure a successful future.
Watch Now
Business Insights
Comparing Business Valuation Methods
Blog
Comparing Business Valuation Methods: Which is Right for You?
Valuation experts rely on three primary approaches to determine the value of a business: income approach, asset approach, and market approach.
Read More
  • Financial Services
Services
  • Financial Planning
  • Investment Advisory
  • Retirement Plan Services
  • Pooled Employer 401(k) Plan
View All
Resources
  • Lutz Financial Blog
  • Our Team
  • Client Portal
  • Charles Schwab Login
  • Send Files Securely
Contact Us
NEWS & INSIGHTS
Website Featured Content Images
Market Commentary
Financial Market Updates

Read our latest financial market updates and sign up to receive them straight to your inbox.

Read More
  • M&A Services
Services
  • Sell-Side Representation
  • Transaction Advisory
  • Exit Planning
  • Business Valuation
View All
Resources
Selling a C Corporation
Blog
Factors to Consider When Selling a C Corporation

Understand the tax issues affecting both buyers and sellers involved in C corporation merger and acquisition transactions

Read More
Business Insights
Post-Acquisition Checklist
Guide
Post-Acquisition Checklist for a Seamless Transition
To help you navigate this critical period, we've compiled a comprehensive checklist covering key areas that demand attention after the deal closes. 
Read More
  • Talent Services
Services
  • Search & Staffing
  • Outsourced HR
  • HR Consulting
View All
Candidate Resources
  • Job Seeker Process
  • Current Opportunities
  • Lutz Internships
Contact Us
News & Insights
Overcoming Bias in Recruitment
Blog
Unconscious Bias in Recruitment: How to Overcome It
Learn how to take the bias out of recruitment and build a diverse, talented workforce with these tips.
Read More
  • Tech Services
Services
  • Outsourced IT
  • Data Analytics
  • Technology Strategy
  • Software Consulting
View All
Resources
When to outsource your IT
Blog
How to Know When It's Time to Partner with an IT Pro

One day your technology seems manageable, and the next you're wondering if you need more support. Here are the clear signs it's time to outsource your IT.

Read More
Business Insights
Untitled design (1)-Mar-08-2024-08-50-35-9527-PM
Video
Pella Client Testimonial
"I've used them for valuation work, stock transfers, hosting all of my technology, and now data analytics. I'd say they lead the pack in terms of anticipating what I'm going to need before I even know I need it."
View Now
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
Webinars & Events
Events
Register Today

Register for an upcoming event or access our library of on-demand recordings.

View All
Market Updates
COMMENTARY
Stay Informed

Catch up on market moves with our weekly update, featuring in-depth insights and analysis.

View All
Resources
EBOOKS & GUIDES
Download Now

Take a deep dive into challenging business topics with these free educational resources. 

View All
  • News & Insights
  • Business Insights
  • Webinars & Events
  • Market Updates
  • Resources
Business Insights
BLOG
Explore Topics

Get the latest news and insights on relevant topics that matter most to you.

View All
  • About
About

Lutz is a business solutions firm for people seeking a partner to help energize and heighten economic and organizational success.

Our Company
Our Team
Offices
Careers
Internships
Contact Us
  • Contact
Client Portal

Log in to your relevant client portal to access your account, upload documents, or make a payment.

Make a Payment
Accounting Client Portal
Financial Client Portal
Charles Schwab Login
Send Files Securely
Contact Us
  • Cybersecurity

I’ve Been Hacked…Now What?

Cayla Kurtenbach, Account Manager
September 29, 2023
I’ve Been Hacked…Now What?

No matter how careful you are about keeping your sensitive information private, hacking can—and does—happen. Whether it's your email, social media accounts, or POS system, no online platform is entirely immune to hackers. However, there are steps you can take to protect yourself and mitigate the damage if you've fallen victim to a breach. In this article, we will discuss the signs of being compromised and provide you with immediate steps to safeguard your personal information and prevent it from happening again.

 

Signs You’ve Been Hacked

  • Slow Performance or Freezing: Pay attention to sudden changes in system behavior, such as frequent crashes, slow performance, or unusual error messages. These could indicate the presence of malware or a breach.
  • Unfamiliar Accounts or Users: Regularly review your user accounts and permissions. If you notice unfamiliar accounts or users with elevated privileges, it could be a sign of a security breach.
  • Suspicious Emails or Messages: Be vigilant of unexpected emails or messages that appear to be from your contacts but contain suspicious links or attachments. Hackers often use phishing techniques to trick individuals into revealing personal information. Keep an eye on outgoing emails that you did not send. Hackers often hijack email accounts to send phishing emails or spread malware to others.
  • Unauthorized Access to Systems or Data: If you notice unauthorized access attempts or suspicious activity within your systems, databases, or social media accounts, it's crucial to investigate further.
  • Unexplained Data Usage or Network Traffic: Keep an eye on your internet data usage and monitor your network for spikes in data traffic. If you notice a significant increase without any reasonable explanation, it could be a sign that someone else is using your network.
  • Disabled Security Software: Hackers may try to disable your security software to gain access to your personal information without detection. If your antivirus or firewall suddenly becomes disabled, it could be a red flag.
  • Data Encryption or Ransomware Messages: If you encounter messages demanding payment in exchange for access to encrypted files or systems, it's a clear sign that you have been targeted by ransomware.

 

What to Do When You've Been Compromised

1. Change Your Passwords Immediately

The first and most crucial step when you suspect you've been hacked is to change your passwords. Start by focusing on the device, application, or account that was compromised, but also consider any other accounts that share similar passwords. Creating strong, unique passwords for each account is essential to prevent hackers from gaining unauthorized access. Avoid using variations of previously used passwords, as hackers often attempt to exploit patterns or reuse passwords across multiple accounts. Consider using a reliable password manager like Last Pass to generate secure passwords and manage them effectively. We recommend using passphrases that are hard to guess but easy to remember, like “IloveTURKEYbac0n.” You can learn more about password management tips by reading our latest blog.

2. Enable Multi-factor Authentication (MFA)

Besides changing your passwords, it is crucial to secure your login processes by enabling multi-factor authentication (MFA). MFA adds an extra layer of security by requiring additional verification, such as a unique code sent to your mobile device, in addition to your password. We recommend using an Authenticator app (such as MS Authenticator App or Google Duo) ahead of SMS MFA. This ensures that even if your password is compromised, hackers will still be unable to access your accounts. Set up MFA for all your online log-ins, including social media, email, financial institutions, and other platforms offering this feature.

3. Monitor Your Account Activity

After securing your log-in processes, thoroughly review the activity in your compromised account. If it's a financial institution, check for any unusual transactions or withdrawals. If it's a social media account, carefully inspect your posts, messages, and friend requests to identify any suspicious activity you may not have initiated. It's also essential to inform any other parties affected by the breach, such as your family or clients. Promptly reporting any unauthorized activity can help mitigate the potential damage caused by the hack.

4. Reset Devices and Accounts

If your computer, phone, or any other device has been compromised, it's crucial to immediately reset or factory reset the device. This will erase any malicious software or unauthorized access and restore the device to its original state. Additionally, for online accounts that have been compromised, such as email or social media, carefully review and reset the account settings. Remove suspicious connections, revoke access to third-party applications, and update your personal information to prevent further unauthorized access.

5. Contact Resources Who Can Assist

Experiencing a hack can be distressing, but it's essential to remember that you're not alone. Reach out to the appropriate resources who can provide immediate assistance and guidance in dealing with the aftermath of a hack. Contact your financial institutions, email service providers, or social media platforms to report the breach and seek their expertise in securing your accounts. These organizations have dedicated teams to handle such incidents and can take swift action to protect your information and prevent further unauthorized activity.

6. Take Preventative Measures for the Future

After addressing the immediate aftermath of a hack, it's crucial to take proactive steps to protect yourself from future incidents. Update your passwords regularly, using a combination of uppercase and lowercase letters, numbers, and special characters. Enable multi-factor authentication whenever possible and consider implementing additional security measures, such as biometric or passwordless log-ins. Regularly back up your data to ensure you have a copy in case of a breach or device failure. Adopting these preventative measures significantly reduces the risk of falling victim to future hacking attempts.

Cyberattacks can have severe consequences, including financial loss, reputational damage, and legal implications. Remember, being proactive is key to mitigating the impact of a potential hack. By following these steps, you can strengthen your digital security and protect sensitive information from falling into the wrong hands. Please contact us if you have questions or would like to learn more about our Lutz Tech services.

  • Learner, Achiever, Input, Restorative, Relator

Cayla Kurtenbach

Account Manager

Cayla Kurtenbach, Account Manager, began her career in 2012. With over a decade of experience in account management and client service, she brings a collaborative, solution-oriented mindset to her role. Her progression through client-facing positions has shaped her ability to build strong, lasting partnerships. 

Focused on relationship management and client coordination, Cayla serves as the primary point of contact for Lutz Tech customers. She communicates progress on IT initiatives, negotiates contracts, and ensures projects stay on schedule while keeping clients informed and supported every step of the way. Cayla values the opportunity to solve problems and deliver a level of service that gives clients peace of mind and confidence in their technology. 

 

Cayla lives in Omaha, NE, with her husband Josh and their dog Maru. Outside the office, you can find her reading, traveling, learning new languages, or heading outdoors for a walk or hike. 

402.827.2359

ckurtenbach@lutz.us

Connect on LinkedIn

Recent News & Insights

Recent News
Lutz Announces Redemption of Ron Nebbia’s Shares
Lutz, a Nebraska-based business solutions firm, announces the redemption of ownership held by ...
Read More
Market Commentary
2025 Has Been a Boring Year + 5.14.25
2025 Has Been a Boring Year Imagine you went to sleep on New Year’s Eve and just woke up ...
Read More
Job Seeker
5 Ways to Maximize Your Chances of Employment
Let’s face it, job searching can be a rollercoaster. One moment you're motivated, the next ...
Read More
Guide
Finding a Lifelong Career
You’ll spend over 90,000 hours of your life at work. That’s more time than you’ll spend with ...
Read More
module-bg-desktop module-bg-mobile

Let’s get you where you want to go.

We work to simplify complexities, help make critical business decisions, and confidently focus on the things that are truly important to you. We embrace your business as our own to spark the right solutions and help you thrive.
Contact Us
Lutz-Logo-white
  • Services
    • Accounting
    • Consulting
    • Financial
    • M&A
    • Talent
    • Tech
  • About
    • Our Company
    • Our Team
    • Offices
    • Careers
    • Internships
    • Current Opportunities
  • Client Portal
    • Make a Payment
    • Accounting Client Portal
    • Financial Client Portal
    • Send Files Securely
    Submit RFP
TOLL-FREE: 866.577.0780 | © Lutz & company, PC 2025 | Privacy Policy
Follow us on Facebook Follow us on LinkedIn Twitter - X Logo Follow us on Instagram Follow us on Facebook