Center for Cyber Defense Education

How to Know if You've Been Hacked!

Friday, October 1, 2021

2:00 PM - 3:30 PM EDT

What are signs of malicious activities on your computer or in your email account?

Do you know you can investigate suspicious activity on your personal computer or see logs of your email activity?

In today's threatscape, a phishing email can be devastating to even large enterprises. How about end-users? How can they protect themselves without expensive cyber security tools?

Threat actors target personal computers to attack others by weaponizing the compromised devices. Also, they target your email addresses to send phishing emails by by pretending to be you, and deceiving victims.

In this presentation, the users will conduct an investigation on their personal computers and email addresses whether there are suspicious activities.

This activity includes checking incoming and outgoing network traffic in a computer, IP address investigation, network session investigation by looking at the amount of network traffic, checking task schedulers that are used for attacks, auditing the activities that can be used in an attack such PowerShell and firewall logs auditing.

Also, this activity will cover checking on email accounts including recent sign-ins with the recent IP addresses and locations, inbox and forwarding rules, and security alerts. Lastly, this activity will show how to avoid data loss/data breach by covering the encryption features.