Chapter 8. Getting Your Life Back After You've Been Hacked
By following the advice contained in this book, you will be able to reduce the likelihood of your device or information getting hacked. However, it is important to remember that hackers may still, despite our best intentions, be successful in their attempts at hacking our devices. Every user should prepare a list of steps, phone numbers, and device information in the event that a device or information is hacked. With such a list in hand, a user will reduce the time and frustration entailed in containing the damage and getting life back on track after an incident.
This chapter will show:
What is included in a device profile and why this is important to you
Why backups are important
What to do if you have been hacked
A checklist of what you should do if your device is hacked/lost
What to do if your device is lost