Chapter 9

Chapter 7: When Things Go Wrong

7 min read

It's 2 AM. You can't sleep because you just realized your email has been sending spam to everyone in your contacts. Or maybe it's Saturday afternoon and your credit card company is calling about charges in Romania. Or perhaps it's a quiet Tuesday when you discover you're completely locked out of your photo storage with ten years of memories.

Deep breath. This chapter is your emergency response guide.

"I've Been Hacked" - The First 60 Minutes

The moment you realize you've been compromised, every minute counts. Here's your immediate action plan:

Minutes 1-10: Stop the Bleeding

If it's your email: 1. Try to log in immediately 2. If successful, change password NOW 3. Check sent messages for spam 4. Review account settings for changes 5. Look for forwarding rules hackers set up

If it's financial: 1. Call the bank/credit card company 2. Freeze the account 3. Report fraudulent charges 4. Ask about additional protection 5. Get a case number

If it's social media: 1. Try to log in 2. If locked out, use "Account Compromised" option 3. Alert close friends/family not to click links from you 4. Report to platform immediately 5. Check connected apps

Minutes 10-30: Damage Assessment

Quick audit of what the compromised account had access to: - Other accounts using same password? (Change them) - Password reset emails go there? (Secure those accounts) - Financial information stored? (Alert banks) - Personal information visible? (Prepare for identity theft) - Connected to other services? (Disconnect them)

Minutes 30-60: Secure the Perimeter

1. Change passwords on all Fort Knox accounts 2. Enable two-factor everywhere possible 3. Check all account recovery options 4. Review recent account activity 5. Document everything for reports

The Complete Account Recovery Guide

Sometimes you're not hacked—you're just locked out. Here's how to get back in:

The Standard Recovery Process

Step 1: Don't Panic Click - Try once with your best guess password - Stop and think before second attempt - Many sites lock after 3-5 attempts

Step 2: Check the Obvious - Caps Lock on? - Using correct email? - Right website? (Not a phishing copy?) - Saved password in browser?

Step 3: Use Official Recovery - Click "Forgot Password" (not email links) - Check email (including spam) - Follow instructions exactly - Save new password properly

When Standard Recovery Fails

Lisa's nightmare: "My dad died, and his email account was the recovery email for everything. When I couldn't access his email, I couldn't access anything else."

Advanced Recovery Options:

For Email Accounts: - Security questions (think hard) - Backup email (check old accounts) - Phone number (old numbers too) - Account creation date - Contact history

For Financial: - Call during business hours - Have account numbers ready - Verify identity multiple ways - Escalate to supervisor - Get everything in writing

For Social Media: - Submit ID verification - Provide account history - Use connected friends - Try multiple support channels - Be persistent

The Nuclear Option: Starting Over

Sometimes the account is gone forever. Accept it and: 1. Create new account 2. Alert contacts of change 3. Download data if possible 4. Update other services 5. Learn from the experience

Lost Phone/Computer Disasters

Your phone falls in the pool. Your laptop is stolen. Your house burns down. Now what?

The Device Disaster Protocol

Immediate Actions: - Remote wipe if possible - Alert carrier (for phones) - File police report (for theft) - Change all critical passwords - Review accounts for suspicious activity

The Recovery Process:

For Phones: 1. Get replacement device 2. Restore from backup 3. Re-enable two-factor apps 4. Check all logged-in sessions 5. Update recovery numbers

For Computers: 1. Assess what was stored locally 2. Change passwords accessed from device 3. Check browser saved passwords 4. Review automatic logins 5. Monitor financial accounts

Prevention for Next Time: - Regular backups (automated) - Encryption on devices - Remote wipe capability - Password manager not browser - Critical info in multiple places

Identity Theft Response

This is the big one. Someone isn't just in one account—they're pretending to be you.

The Identity Theft Action Plan

Day 1: Crisis Mode 1. Place fraud alerts with credit bureaus 2. Order credit reports 3. File police report 4. Contact all financial institutions 5. Document everything

Week 1: Damage Control - Close compromised accounts - Open new secure accounts - Update all passwords - Set up credit monitoring - Contact creditors about fraudulent charges

Month 1: Recovery - Dispute fraudulent charges - Work with credit bureaus - Consider identity theft protection - Update security on everything - Stay vigilant

The Paper Trail Keep records of: - All correspondence - Phone calls (date, time, person) - Police reports - Dispute letters - Resolution confirmations

Family Member Exploitation

The hardest situation: When the threat comes from inside.

Rachel's story: "My ex-husband still knew my passwords. He logged into my accounts, read my emails, and tracked my location through shared apps. It took months to feel safe again."

Securing Against Insider Threats

Immediate Steps: 1. Change EVERY password 2. New email account for critical services 3. Check all devices for tracking 4. Review all logged-in sessions 5. Enable login notifications

The Complete Lockdown: - New recovery questions (they know the old ones) - New security PINs - Different password patterns - Remove authorized users - Check for key loggers

Legal Protection: - Document unauthorized access - Save evidence - Consider restraining order - Work with lawyer - Use legal password sharing only

The "My Kid Did Something Stupid" Scenario

Your teenager shared passwords with friends. Your 8-year-old gave the iPad password to a stranger online. Kids make mistakes.

The Teaching Response

Don't: - Panic or yell - Shame them - Overreact - Ban technology

Do: - Stay calm - Assess damage - Fix together - Use as teaching moment - Adjust supervision

Age-Appropriate Responses:

Young Kids (5-10): - Simple explanation of danger - Reset passwords together - Increase supervision - Praise for telling you

Tweens (11-14): - Detailed discussion of risks - Let them help fix it - Create new rules together - Monitor more closely

Teens (15-18): - Adult conversation about consequences - They fix it with your guidance - Discuss legal implications - Respect their growing independence

When Companies Fail You

Sometimes the problem isn't hackers or mistakes—it's the companies themselves.

Common Company Failures: - Data breaches they don't report quickly - Impossible account recovery processes - Customer service that doesn't help - Sudden service shutdown - Policy changes that lock you out

Your Rights and Responses:

Document Everything: - Screenshot policies - Save email communications - Record phone calls (where legal) - Keep timeline of events

Escalation Path: 1. Regular customer service 2. Supervisor/manager 3. Social media (public pressure) 4. Executive email carpet bomb 5. Regulatory complaints 6. Legal action if needed

Your Emergency Response Kit

Create this NOW, while you're calm:

Digital Kit: - List of all Fort Knox accounts - Backup authentication codes - Emergency contact numbers - Account numbers (partial) - Recovery information

Physical Kit: - Printed emergency contacts - Account recovery hints - Important phone numbers - Trusted person's contact - Basic instruction sheet

The Emergency Plan: - Who to call first - What to check immediately - How to stop damage - Where backups are located - When to involve authorities

Bouncing Back Stronger

Every crisis is a learning opportunity. After you've handled the emergency:

Conduct a Post-Mortem: - What went wrong? - How did they get in? - What made recovery hard? - What worked well? - What needs improvement?

Upgrade Your Security: - Fix the vulnerability - Add extra protection - Update your emergency kit - Share lessons learned - Practice recovery process

Quick Win Box

Create Your "Oh Shit" Sheet

Right now, create a one-page document:

If Email Hacked: - Phone: [Bank #] - Phone: [Credit Card #] - Check: [Other accounts using same password] - Change: [List of connected services]

If Phone Stolen: - Call: [Carrier #] - Remote wipe: [How to] - Change: [Critical passwords] - Alert: [Family/work]

If Locked Out: - Recovery email: [Which one] - Recovery phone: [Number] - Security answers: [Hints only] - Backup plan: [What to do if above fails]

Print it. Put it somewhere safe. Hope you never need it.

Real Life Sidebar: The Success Story

Michael's small business was hit with ransomware. Every computer was locked. The hackers wanted $50,000.

"I wanted to panic," he said. "But I pulled out my emergency binder. We had backups. We had written passwords. We had a response plan. Within 6 hours, we were running on new computers with yesterday's data. Lost one day of work instead of the whole business."

Preparation is everything.

---