Skip to the content
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
  • Why Vertex
    • Expertise in Education
    • Your Trusted Partner
    • Humanitix Case Study
    • Give Back
    • Careers
  • Penetration Testing
  • ISO27001
  • Cyber Training
  • Solutions
    • Cyber Security Audit
    • Incident Response
    • Managed Services
  • News
  • Contact
LOG IN

Help! I’m Under Personal Cyber Attack!

Have you ever experienced a personal cyber attack?

There have been a lot of data breaches and there will be many more as Cyber Security is complicated and hard to do. Some people may be personally attacked and this breached data means that they are vulnerable to a full range of attacks.

Ideally a personal cyber attack shouldn’t happen but, if it does happen, there are always options. In many of these cases people are targeted by someone they know such as an ex-partner, ex-colleague, ex-lover, ex-IT support or neighbour. We would always recommend contacting your local Police station to provide a statement to make sure there is a record of events.

Performing the tasks below will destroy evidence and potentially eliminate the option for seeking criminal prosecutions or suing for damages. So seeking legal advice is also recommended to ensure the capturing of evidence in order to seek criminal prosecutions and sue for damages.

In regards to the Cyber Attack, starting from the simplest and moving down in difficulty, some of the options are:

  1. Reset Passwords
  2. Add 2FA (Two-Factor Authentication) ideally using FIDO2 for all logins
  3. Factory Reset computers and phones
  4. Install Trusted AntiMalware software to computers and phones
  5. Change Mobile phone numbers
  6. Purchase new computers and phones
  7. Change drivers licence
  8. Change email address
  9. Change living Address
  10. Change work
  11. Change Name and Identification documents

This is not an exhaustive list, but shows that there is always an option even if you need to perform all these items and “reset” your status in society and thereby “reset” the ability for a Cyber Attacker to target you.

Speaking to a Cyber Expert can also be useful. However, be careful who you trust as we have seen that sometimes the trusty partner / neighbour / friend / IT company has actually been part of the Cyber attack. We would only recommend talking to a CREST approved company like Vertex. However be aware that these organisations are geared for businesses with many computers so the price for an individual may appear expensive.

CATEGORIES

Cyber Attack

TAGS

personal cyber attack

SHARE

PrevPreviousLatitude Data Breach – What Should You Do?
NextService NSW sensitive data LeaksNext

Follow Us!

Facebook Twitter Linkedin Instagram
Cyber Security by Vertex, Sydney Australia

Your partner in Cyber Security.

Terms of Use | Privacy Policy

Accreditations & Certifications

blank
blank
blank
blank
blank
  • 1300 229 237
  • Suite 13.04 189 Kent Street Sydney NSW 2000 Australia
  • 121 King St, Melbourne VIC 3000
  • Lot Fourteen, North Terrace, Adelaide SA 5000
  • Level 2/315 Brunswick St, Fortitude Valley QLD 4006, Adelaide SA 5000

(c) 2025 Vertex Technologies Pty Ltd.

download (2)
download (4)

We acknowledge Aboriginal and Torres Strait Islander peoples as the traditional custodians of this land and pay our respects to their Ancestors and Elders, past, present and future. We acknowledge and respect the continuing culture of the Gadigal people of the Eora nation and their unique cultural and spiritual relationships to the land, waters and seas.

We acknowledge that sovereignty of this land was never ceded. Always was, always will be Aboriginal land.