Skip to main content


Cybersecurity and information or network protection
Michigan Attorney General Logo


Hackers usually gain access to devices through phishing attacks like emails or text messages that might appear to be from a legitimate source but contain links that allow hackers to access your device. Other ways they can gain access is through scams where they may pose as a legitimate company like Microsoft, Norton Antivirus, Geek Squad, and others, to gain access by remoting into your device(s) under the guise of assisting you. There are many ways hackers can gain access to devices or accounts and the damage they can do once they are in, is limitless.

Below you will find some precautionary steps that may help prevent and/or recover from hacking

  • Change your password (If password was reused for other accounts change all reused password to new unique one).
  • Use antivirus software on any device that connects through Wi-Fi connections.
  • Review login activity and log out of all active sessions on all devices.
  • Implement multifactor authentication (MFA/2FA) on all accounts.
  • If a phone or tablet is compromised, it’s commonly a sim swap attack and you would need to reach out to your wireless provider.
  • If your Wi-Fi router was compromised, log into the router and change the password, then upgrade the software/firmware.
  • For removing malware, spyware, or viruses, you would need to take the device(s) to a tech support company for diagnostics and repair.
  • If an email account was compromised check for forwarding rules.

If you suspect the hacking you are experiencing has resulted in identity theft, please visit our Michigan Identity Theft Support website for more information on steps you can take to help prevent fraudulent use of your personal information.

Steps to Help Prevent Fraudulent Use of Your Personal Information