Is there a serious IT tech in here?



Been fighting with hackers for three years now and I need a trustworthy guy or gal who knows how to fix my shit up and harden my topology plz.
Answers
-
From the top of my head ..
- Disable UPNP in your router;
- Manually assign IP-addresses to your devices;
- Register the MAC addresses of your devices in your router;
- MAC-block anything that is NOT one of those devices;
- Let FING block anything unknown;
- Many routers can do that as well;
- Check port forwarding and remove anything you do not recognise;
- Consider removing port forwarding at all;
- Regularly reset your external IP address;
- Use a trustworthy DDNS service;
- If your router supports it, use a VPN;
- HIDE your network SSIDs;
- Use strong passwords (password manager/generator) and WPA3 if your router supports that. Minimal WPA2;
- Fine-tune the transmission power, if your router supports that. Make it as low as possible. Your devices should still be able to pick it up. Check the speed penalty and increase power until comfortable;
- Use cable, where possible;
- Use a managed switch and protect the ports;
- etc...
4 -
If you are only using your ISP's modem/router, get a real firewall router and put the ISP device in bridge mode. In other words, use it only as a modem. If it also provides WiFi access, disable that (bridge mode should do that), and get a separate WiFi access point and wire it directly to your new firewall router. All of this will cost more up front, but it will be a much better and secure network. This setup gives you the flexibility to upgrade or replace these individual components in the future. Want to change ISPs (assuming you have a choice), you only need to change the modem. Want to upgrade to a newer WiFi standard, replace the access point. Also, the recommendations in the previous post are things you can do in addition to the equipment changes.1
-
MOP said:
Been fighting with hackers for three years now and I need a trustworthy guy or gal who knows how to fix my shit up and harden my topology plz.
0 -
I have had him chasing my account's for 4 years. I know it's him and just don't know how to remove him from all levels of my life.
He don't hide it from me as he uses references from my life in his hacking but not enough proof systematically to legally prove it and I. Desperate to lock his assets up asap.
Lost a business cause of him and I want to relaunch again.
0 -
-
MOP said:
I have had him chasing my account's for 4 years. I know it's him and just don't know how to remove him from all levels of my life.
He don't hide it from me as he uses references from my life in his hacking but not enough proof systematically to legally prove it and I. Desperate to lock his assets up asap.
Lost a business cause of him and I want to relaunch again.
MOP said:I have had him chasing my account's for 4 years. I know it's him and just don't know how to remove him from all levels of my life.
He don't hide it from me as he uses references from my life in his hacking but not enough proof systematically to legally prove it and I. Desperate to lock his assets up asap.
Lost a business cause of him and I want to relaunch again.
It is a matter for the Police.0 -
BarnabasDK said:
It is a matter for the Police.
I don't know how good they are, but here's a link to another option, https://comsecllc.com/. They have an online quote request form available. You can always check to see what the cost may be to get an idea.
Being hacked is horrible, so I wish you the best and really hope you can get some resolution.
0 -
What sort of topology are you running (don't need any details) and how are you connected to the Net (FixedIP/DHCP/..) ?
Did you scout for backdoors in your network, e.g. isn't there a computer infected with some kind of remote login?
We monitor our routers 24/7 by logging anything that comes thru in both directions. It gives a clear view on where the traffic goes and if there is abnormal traffic going somewhere (local or WAN) and blocks any unexpected data burst. This is pretty high-level and costly stuff though. (Get experts in)
Best option at this moment is to disconnect the infrastructure completely and do a clean-sweep on al attached devices, even camera's and TV's, if any. Remove and deny access to unprotected mobile devices and keep it that way.
Probably not neccesary to mention:
Network security stands and falls with human behavior. It is well known that there is a serious risk in visiting specific types of websites and 'moving in specific environments'.
Block all social accounts
I think you've let it go too far, considering this is going on for 4 years already. Like The_Vorlon says, get the Police involved here. At this point, you are running out of options.
0
Categories
- 5.8K All Categories
- 2.8K Ask about Connected Technology
- How To...
- 1.1K Devices & Security
- 1.6K Network Troubleshooting & Connectivity
- 114 General Discussion, Weird & Wonderful
- 45 Network Infrastructure
- 5.4K Ask about Fing
- 545 Fing Account Change Request
- 1.1K Fing Desktop
- 1.4K Fing App
- 1.7K Fingbox
- 534 Announcements, Beta Testing & Release Notes
- 158 Community Updates
- 29 Getting started
- 13 Community User Guides