FDIC-Insured - Backed by the full faith and credit of the U.S. Government
-
-
-
FNBO
InsightsMay 19 2025
-
In today’s digital age, our computers and devices store sensitive personal information which makes them prime targets for cybercriminals. If you suspect your computer has been compromised by malware, it's important to take immediate action to protect your data and secure your system. This article outlines the essential steps you should take if you believe your computer has been infected.
1. Immediately Cease All Activity on Your Computer
If you suspect malware on your computer, the first step is to immediately stop using it. Continuing to use it could potentially cause further damage or allow malware to spread to other systems or sensitive data. Disconnect your device from the internet and any networks to prevent malicious software from sending data to remote attackers.
2. Consult a Computer Professional
Enlist the help of a computer professional such as a trusted IT technician or a cybersecurity expert to determine whether your computer has been compromised by malware. The professional can help restore your computer to a secure state and remove any other threats. It’s important not to use your computer until it has been examined and/or restored.
3. Change Your Passwords
It’s imperative to change the passwords on any accounts that were routinely accessed from the compromised computer, including email, social media, and banking accounts. Why? Because your passwords may have been captured by the malware and changing them immediately will help prevent unauthorized access. Be sure to change them on another device if your computer has not yet been restored.
If you’ve conducted any online banking activities on the compromised computer, follow steps 4-7 outlined below.
4. Maintain a Written Chronology of What Happened
Document what happened, what damages were incurred, and the steps taken to report the incident to the various agencies, banks, and firms impacted. Be sure to record the date, time, contact telephone number, person spoken to, and any relevant report or reference numbers and instructions. This written chronology may prove useful in identifying if/when your computer was compromised, and which accounts may have been affected. Documenting such details will also assist in tracking which institutions or agencies have been contacted should the compromise lead to identity theft.
5. Contact Your Financial Institutions
Immediately contact all financial institutions with which you have accounts, so that the following actions may be taken:
- Disable online access to accounts.
- Change online banking passwords.
- Open new account(s) as appropriate.
- Ensure that no one has requested an address change, title change, PIN change, or ordered new cards, checks, or other account documents be sent to another address.
Prompt action can help you prevent any further unauthorized transactions and secure your accounts.
6. Notify the Credit Bureaus
It’s important to protect your credit and prevent any potential identity theft. Contact one of the three major credit bureaus to obtain a copy of your credit report and place a 90-day fraud alert on credit report. This will help keep anyone from opening accounts in your name without your permission. When you alert one credit reporting bureau, they’ll notify the other two, who will then contact you for more information.
- Equifax Fraud Division: 1.800.525.6285 | www.equifax.com
- Experian Fraud Division: 1.888.397.3742 | www.experian.com
- TransUnion Fraud Division: 1.800.680.7289 | www.transunion.com
7. Consider Filing a Police Report
If you believe that your personal or financial information has been compromised, filing a police report may be an important step. If you choose to report the crime, be prepared to provide the facts and circumstances surrounding the incident and any damages\losses. Be sure to obtain a police report number with the date, time, department, location, and the name of the officers taking the report or involved in the subsequent investigation.
A police report can be especially helpful when working with banks, insurance companies, or other institutions involved in the recovery process. Additionally, it could help law enforcement identify, arrest, and prosecute the offender(s) and possibly recover losses.
Having your computer compromised by malware can be a stressful and potentially costly experience. But by acting quickly and following the steps outlined above, you can minimize the damage, protect your data, and prevent further harm. Always be vigilant about your cybersecurity practices, and don't hesitate to seek professional help if needed.
The articles in this blog are for informational purposes only and not intended to provide specific advice or recommendations. When making decisions about your financial situation, consult a financial professional for advice. Articles are not regularly updated, and information may become outdated.