By following the advice contained in this book, you will be able to reduce the likelihood of your device or information getting hacked. However, it is important to remember that hackers may still, despite our best intentions, be successful in their attempts at hacking our devices. Every user should prepare a list of steps, phone numbers, and device information in the event that a device or information is hacked. With such a list in hand, a user will reduce the time and frustration entailed in containing the damage and getting life back on track after an incident.
This chapter will show: