Cyber Incident Response Guide (Personal): Difference between revisions
added in if no and unsure options to the flow |
bullet echelons |
||
(4 intermediate revisions by the same user not shown) | |||
Line 51: | Line 51: | ||
* '''Are your internet searches being redirected to unfamiliar sites?''' | * '''Are your internet searches being redirected to unfamiliar sites?''' | ||
If you answer '''YES''' to any of these questions, proceed to [[#Secure Your Local Devices]]. | If you answer '''YES''' to any of these questions, proceed to [[#Log File Analysis]] and [[#Secure Your Local Devices]]. | ||
If you answer '''NO''', keep an eye on your device performance and consider running a periodic malware scan. | If you answer '''NO''', keep an eye on your device performance and consider running a periodic malware scan. | ||
Line 84: | Line 84: | ||
* '''Did you receive an email or message asking for personal or financial information?''' | * '''Did you receive an email or message asking for personal or financial information?''' | ||
* If '''YES''': | |||
** Do not respond or click on any links. | |||
** Mark the email as spam and delete it. | |||
** Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message. | |||
* If '''NO''', remain vigilant against suspicious communications. | |||
* If you're '''UNSURE''', verify the sender's identity through another communication channel before taking action. | |||
'''Financial Scams''' | '''Financial Scams''' | ||
Line 99: | Line 99: | ||
* '''Did someone request money or your banking information?''' | * '''Did someone request money or your banking information?''' | ||
* If '''YES''': | |||
** Be cautious. Scammers often pressure you using fear or urgency. | |||
** Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/ common financial scams]. | |||
** Proceed to report the incident if necessary. | |||
* If '''NO''', stay alert for unusual requests for money or information. | |||
* If you're '''UNSURE''', consult with someone trustworthy before proceeding with any requests. | |||
===== Accidents ===== | ===== Accidents ===== | ||
Line 114: | Line 114: | ||
* '''Has your device been lost or stolen?''' | * '''Has your device been lost or stolen?''' | ||
* If '''YES''': | |||
** Change passwords for your accounts and enable two-factor authentication. | |||
** Try to locate the device using a tracking app or service. | |||
** Consider remotely wiping the device to protect your data. | |||
* If '''NO''', ensure that tracking features are enabled on all devices as a precaution. | |||
* If you're '''UNSURE''', check recent locations if tracking was enabled previously. | |||
* '''Did you accidentally delete important files or information?''' | * '''Did you accidentally delete important files or information?''' | ||
** If '''YES''', proceed to [[#Restore]] for data recovery steps. | |||
* If '''NO''', consider setting up regular backups to prevent future data loss issues. | |||
* If you're '''UNSURE''', check if the files are in the recycle bin or use recovery software as needed. | |||
===== Log File Analysis ===== | |||
To analyze log files for suspicious activity effectively, refer to our detailed guide: [[How_to_Search_Log_Files]]. This guide provides instructions for operating systems including iOS, Android, Windows, MacOS, and Linux. It covers accessing logs, identifying suspicious activities, and interpreting log entries related to security incidents. | |||
While you are on this step you should look at [[#Secure Your Local Devices]] as well | |||
== Secure == | == Secure == | ||
Line 143: | Line 149: | ||
# Check for Data Breaches: Visit [https://haveibeenpwned.com/ Have I Been Pwned] to see if your email has been compromised. | # Check for Data Breaches: Visit [https://haveibeenpwned.com/ Have I Been Pwned] to see if your email has been compromised. | ||
# Prioritize Critical Accounts: | # Prioritize Critical Accounts: | ||
** Email Accounts: Especially ones used for account recovery. | |||
** Financial Accounts: Banks, credit cards, crypto wallets. | |||
** Mobile Carrier Account: To prevent SIM swapping. | |||
** Social Media: To prevent impersonation. | |||
# Remove Personal Data from Data Brokers: Use opt-out lists like the [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List Big Ass Data Broker Opt-Out List]. | # Remove Personal Data from Data Brokers: Use opt-out lists like the [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List Big Ass Data Broker Opt-Out List]. | ||
Line 186: | Line 192: | ||
# Account Recovery: | # Account Recovery: | ||
** Reset passwords and security questions. | |||
** Use masked emails for sensitive accounts. | |||
# Data Recovery: | # Data Recovery: | ||
** Restore files from backups if available. | |||
** Use data recovery software or consult a professional. | |||
# Reinstall Operating System: | # Reinstall Operating System: | ||
** In severe cases, consider reinstalling your OS to ensure all malware is removed. | |||
== Report == | == Report == | ||
Line 204: | Line 210: | ||
# Notify Affected Parties: Let friends and family know if they might be impacted. | # Notify Affected Parties: Let friends and family know if they might be impacted. | ||
# File Complaints: | # File Complaints: | ||
** With the [https://reportfraud.ftc.gov/#/ FTC] for scams and fraud. | |||
** With other relevant authorities. | |||
== Learn == | == Learn == | ||
Line 221: | Line 227: | ||
# Regularly Check Accounts: Monitor bank statements and account activities. | # Regularly Check Accounts: Monitor bank statements and account activities. | ||
# Use Monitoring Services: Consider credit and identity theft monitoring services. | # Use Monitoring Services: Consider credit and identity theft monitoring services. | ||
# Use Monitoring Apps: Little Snitch and Other options are broken down in [https://alternativeto.net/software/little-snitch/ AlternativeTo.net] | |||
# Stay Updated: Follow reputable sources for security news. | # Stay Updated: Follow reputable sources for security news. | ||