Skip to main content

Is someone tracking your typing? Here's how you can protect yourself against key logging


Key logging, or keystroke logging, is a way of keeping track of every button you press on your keyboard. Although key loggers have a few honorable uses, they can also be used for slightly more nefarious ones. 

Key loggers can be installed on your system as software, or on rare occasions they can even be installed as hardware. They're often used by businesses to monitor their employees' computer usage, and they can also be found in some parental controls. However, the key loggers that we're interested in are the ones that shouldn't be on your computer; the ones that are quietly tracking your typing.

These nasty kind of key loggers may be installed on a computer as part of a drive-by download, through a dodgy website, a malware laden torrent or a suspicious attachment on an email. They're tricky little things to locate once they're on your device; often they'll disguise themselves so you can't see them running away in the background - even if you're looking right at them. 

If you've been hit with a key logger, there probably isn't a hacker on the other side of the world watching you write messages to your partner, or publishing your Harry Potter fan fiction. Like the majority of malware, the key logger will be on the lookout for certain pieces of information that they'll be able to use. Sixteen numbers in a row, for example, is likely to be your debit card number; the first thing you type after you start up your computer is likely to be your password. 

After it has finished highlighting the important information, the key logger can send anything interesting back to the hacker, who can then sieve through the information manually to find anything usable. Bank details are easy to spot, and can be used immediately by hackers. Passwords are often collected, because many people use the same password on different accounts. And once someone even has access to your email account, they can then use that information to wreak havoc

And if you do lose money, data or personally identifiable information to hackers as a result of a key logger, the odds may not be in your favour. A lot of organisations, including banks, will expect you to take basic precautions to protect yourself online. If you've accidentally downloaded something dodgy, and you've not protected yourself properly, there may be very little you can do to get your data or your money back.

So how can I protect myself?

If you're using the internet, you should be using some sort of anti-virus software. We'd recommend F-Secure, or Malwarebytes. Get into the practice of regularly scanning your computer; as well as keeping your machine safe from any nasties, it's also going to keep your device running at top speed and efficiency. If you notice your computer is running significantly more slowly than usual, run a quick scan and then remove anything that your anti-virus flags. If you've noticed an unusual program running in the background, you can check it with Should I Remove It? 

Next, updates. We know that they're annoying, particularly if you've logged on to your computer in the morning only to find that Windows wants to spend the next hour and a half installing something. However, these updates are absolutely vital to keep your computer protected. The temptation to turn them off may be great, but keep your machine up-to-date and it will stay protected against any shiny new viruses and malware that might come your way. You can find out how to schedule Windows updates here, so they won't get in the way of your work day. 

Finally, be careful when you're using sites that you're unfamiliar with. Get to grips with phishing emails so you know what those dodgy links look like. Stay clear of torrents or any downloads from an unverified source. Look after your machine, and take care in what you're clicking on - only then will your bank details, passwords and fan fiction stay private.

Tweet us @TranscenditUK


The Transcendit Way

Transcendit understand that when you choose to work with us, whether we're taking care of your IT, app or web development, you're trusting us with part of your business. So whether we're looking after your computers, phone systems or servers we always do things 'the Transcendit way'.

The whole of our team adhere to the same values, beliefs and policies - the principles that were written when Transcendit first formed in 2000. Whether you come to us for cloud services or recovery backup you can be confident that you'll always receive the same excellent service.

The Transcendit way outlines how we do business; following the same straightforward principles with every client and customer, regardless of how big or small they may be.

That means we get to know you and your business. We offer you a friendly, professional and efficient service, and we'll always be honest with you.
We understand that not everybody speaks fluent IT, so we try to explain things in a way that is simple and clear. We always spend as much time as is necessary explaining things to you.
If you need to talk to us about something, no matter how insignificant, we are only ever a phone call away – and we’re never too busy to make you a cup of tea and have a sit down with you in person.
We understand how frustrating it can be when things are late. When we schedule an appointment with you, we are there when you’re expecting us. If something prevents us from getting there, we always call you in advance to let you know.
Sometimes things can go wrong, but we never lie to you or try to cover something up. If things go askew we tell you what’s happened and how we plan to prevent it affecting your business.
We want you to continuously benefit from working with us. We regularly discuss your business and make suggestions for improving systems and processes wherever we can – but we never try to push you into a purchase.
When we quote a fixed price, that's always the amount we charge – you won’t find any nasty surprises on a bill from us. If you are paying by time and materials, we inform you if our approximations could change.
We understand the importance of privacy for your business and your customers. We respect the confidentiality of your data, and we will never pass on your information to third parties.
We appreciate it when you take the time to give us feedback. A system called CustomerSure records our client's responses, so you can trust that our reviews are from real people.
Find out what they're saying here.
The usual 1st class service that I've come expect as the norm! Dave Wales, Chirmarn

Based on 12075 reviews our customers rate us 9.8/10. Reviews and ratings by Customersure. 09-October-2024

Transcendit are proud sponsors of CHUF, the Children's Heart Unit Fund.

Transcendit is a Living Wage employer
Transcendit is a Microsoft Gold certified partner
VMWARE partner
Vipre partner
IPCortex partner
WithSecure partner
DELL partner
Barracuda partner
Veeam partner
N-Able partner