Check it out: Everything is a little easier when you have a list of steps to help you accomplish your objective. Here are some things you can do.

As soon as you learn you've been hacked

Contact your email provider.
Most email providers have support centers where you can get help. Here are some common providers’ resource sites:

Install antivirus software.

Symantec Norton Antivirus Plus, McAfee Plus, Webroot SecureAnywhere AntiVirus, Bitdefender Antivirus Plus, and Kaspersky Anti-Virus are some of the most well-known products, as noted by software-industry publications such as ComputerWorld.

Scan for and remove any malware.

Malware—software designed to disrupt, damage, or gain unauthorized access to a computer system—can allow someone to access files on your computer or reroute the website you land on from a legitimate one you enter to a fake one. Use the scanning feature in your chosen anti-virus software and then delete any malware it finds.

Update your operating system software.

Use the most current version, which will have the most recent patches and bug protections incorporated. Make it a practice to accept automatic updates or at least do a quick version check once a month.

Once you get access to your account

Change your passwords from a computer you’re confident hasn’t been compromised.

Make sure your new password combines letters, numbers, and characters.

Enable Two-Factor authentication whenever it’s offered.

With this method, you get a call or text message after you enter your password and before you get access to your account. If someone else attempts to get into your account, you’ll be the one seeing—and denying—the verification message.

Look through your sent email list.

Check whether (and what) information may have been sent to a party you don’t recognize. Also, see if your contacts received a message you didn’t send.

Review your account settings.

The Federal Trade Commission (FTC) recommends you confirm your messages aren’t being forwarded to another email address, as well as check your email signature and automatic reply settings for unfamiliar links.

Warn your contacts.

Tell those in your e-mail address book not to respond to unexpected requests for aid or click on any links they might get from you. You can use email once you regain control of your account. A quick phone call to those you’re closest with can’t hurt either.

For more information about Janney, please see Janney’s Relationship Summary (Form CRS) on which details all material facts about the scope and terms of our relationship with you and any potential conflicts of interest.

To learn about the professional background, business practices, and conduct of FINRA member firms or their financial professionals, visit FINRA’s BrokerCheck website: