Lego Cyber Attack Figure
Lego Cyber Attack Figure

Cyber-criminals are incredibly smart with their attacks. You could be unaware of a breach for weeks, or even months.

Traditionally, when we think of a cyber-attack, we think about being locked out of our computer with a payment demand flashing on the screen. This is often not the case. Occasionally a hacker may gain access to your device and monitor it for periods of time, waiting for an opportunity to exploit a weakness. So how do you spot the signs that you are being, or have been, attacked?

Here are some things that may suggest an incident on your device, or a colleague’s device:

  • Unusual activity on your account
  • People informing you of unusual emails or activity from your domain or account
  • Requests for unauthorised payments
  • Requests for change of details, for example, supplier bank details
  • Immediate demands or unusual pressure from a colleague or supplier
  • Being unable to access files or documents you previously could
  • Being locked out of your accounts
  • Computer running slow
  • Applications randomly closing or quitting
  • Settings on your device being changed
  • Your webcam light is on even though you aren’t using the camera in any applications

What should you do if you have been breached? Read our next insight to find out – What you should do if your business is breached by a cyber attack.

Latest Guides

Microsoft 365 Monthly Feature Update. Microsoft Logo.
Microsoft 365 Monthly Feature Update
Check out our top three Microsoft 365 feature releases each month.
Microsoft Copilot
Get up to date with the latest on Microsoft's AI assistant.
Microsoft Clipchamp for Work
Learn more about Clipchamp, Microsoft’s video editor that’s free with 365 business licences.