Cyber Incident Response Guide (Personal): Difference between revisions

added in if no and unsure options to the flow
bullet echelons
 
(4 intermediate revisions by the same user not shown)
Line 51: Line 51:
* '''Are your internet searches being redirected to unfamiliar sites?'''
* '''Are your internet searches being redirected to unfamiliar sites?'''


If you answer '''YES''' to any of these questions, proceed to [[#Secure Your Local Devices]].
If you answer '''YES''' to any of these questions, proceed to [[#Log File Analysis]] and  [[#Secure Your Local Devices]].


If you answer '''NO''', keep an eye on your device performance and consider running a periodic malware scan.
If you answer '''NO''', keep an eye on your device performance and consider running a periodic malware scan.
Line 84: Line 84:
* '''Did you receive an email or message asking for personal or financial information?'''
* '''Did you receive an email or message asking for personal or financial information?'''


  * If '''YES''':
* If '''YES''':
    * Do not respond or click on any links.
** Do not respond or click on any links.
    * Mark the email as spam and delete it.
** Mark the email as spam and delete it.
    * Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message.
** Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message.


  * If '''NO''', remain vigilant against suspicious communications.
* If '''NO''', remain vigilant against suspicious communications.


  * If you're '''UNSURE''', verify the sender's identity through another communication channel before taking action.
* If you're '''UNSURE''', verify the sender's identity through another communication channel before taking action.


'''Financial Scams'''
'''Financial Scams'''
Line 99: Line 99:
* '''Did someone request money or your banking information?'''
* '''Did someone request money or your banking information?'''


  * If '''YES''':
* If '''YES''':
    * Be cautious. Scammers often pressure you using fear or urgency.
** Be cautious. Scammers often pressure you using fear or urgency.
    * Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/ common financial scams].
** Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/ common financial scams].
    * Proceed to report the incident if necessary.
** Proceed to report the incident if necessary.


  * If '''NO''', stay alert for unusual requests for money or information.
* If '''NO''', stay alert for unusual requests for money or information.


  * If you're '''UNSURE''', consult with someone trustworthy before proceeding with any requests.
* If you're '''UNSURE''', consult with someone trustworthy before proceeding with any requests.


===== Accidents =====
===== Accidents =====
Line 114: Line 114:
* '''Has your device been lost or stolen?'''
* '''Has your device been lost or stolen?'''


  * If '''YES''':
* If '''YES''':
    * Change passwords for your accounts and enable two-factor authentication.
** Change passwords for your accounts and enable two-factor authentication.
    * Try to locate the device using a tracking app or service.
** Try to locate the device using a tracking app or service.
    * Consider remotely wiping the device to protect your data.
** Consider remotely wiping the device to protect your data.
    
    
  * If '''NO''', ensure that tracking features are enabled on all devices as a precaution.
* If '''NO''', ensure that tracking features are enabled on all devices as a precaution.


  * If you're '''UNSURE''', check recent locations if tracking was enabled previously.
* If you're '''UNSURE''', check recent locations if tracking was enabled previously.


* '''Did you accidentally delete important files or information?'''
* '''Did you accidentally delete important files or information?'''


  * If '''YES''', proceed to [[#Restore]] for data recovery steps.
** If '''YES''', proceed to [[#Restore]] for data recovery steps.


  * If '''NO''', consider setting up regular backups to prevent future data loss issues.
* If '''NO''', consider setting up regular backups to prevent future data loss issues.


  * If you're '''UNSURE''', check if the files are in the recycle bin or use recovery software as needed.
* If you're '''UNSURE''', check if the files are in the recycle bin or use recovery software as needed.
 
===== Log File Analysis =====
 
To analyze log files for suspicious activity effectively, refer to our detailed guide: [[How_to_Search_Log_Files]]. This guide provides instructions for operating systems including iOS, Android, Windows, MacOS, and Linux. It covers accessing logs, identifying suspicious activities, and interpreting log entries related to security incidents.
 
While you are on this step you should look at [[#Secure Your Local Devices]] as well


== Secure ==
== Secure ==
Line 143: Line 149:
# Check for Data Breaches: Visit [https://haveibeenpwned.com/ Have I Been Pwned] to see if your email has been compromised.
# Check for Data Breaches: Visit [https://haveibeenpwned.com/ Have I Been Pwned] to see if your email has been compromised.
# Prioritize Critical Accounts:
# Prioritize Critical Accounts:
  * Email Accounts: Especially ones used for account recovery.
** Email Accounts: Especially ones used for account recovery.
  * Financial Accounts: Banks, credit cards, crypto wallets.
** Financial Accounts: Banks, credit cards, crypto wallets.
  * Mobile Carrier Account: To prevent SIM swapping.
** Mobile Carrier Account: To prevent SIM swapping.
  * Social Media: To prevent impersonation.
** Social Media: To prevent impersonation.
# Remove Personal Data from Data Brokers: Use opt-out lists like the [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List Big Ass Data Broker Opt-Out List].
# Remove Personal Data from Data Brokers: Use opt-out lists like the [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List Big Ass Data Broker Opt-Out List].


Line 186: Line 192:


# Account Recovery:
# Account Recovery:
  * Reset passwords and security questions.
** Reset passwords and security questions.
  * Use masked emails for sensitive accounts.
** Use masked emails for sensitive accounts.
    
    
# Data Recovery:
# Data Recovery:
  * Restore files from backups if available.
** Restore files from backups if available.
  * Use data recovery software or consult a professional.
** Use data recovery software or consult a professional.


# Reinstall Operating System:
# Reinstall Operating System:
  * In severe cases, consider reinstalling your OS to ensure all malware is removed.
** In severe cases, consider reinstalling your OS to ensure all malware is removed.


== Report ==
== Report ==
Line 204: Line 210:
# Notify Affected Parties: Let friends and family know if they might be impacted.
# Notify Affected Parties: Let friends and family know if they might be impacted.
# File Complaints:
# File Complaints:
  * With the [https://reportfraud.ftc.gov/#/ FTC] for scams and fraud.
** With the [https://reportfraud.ftc.gov/#/ FTC] for scams and fraud.
  * With other relevant authorities.
** With other relevant authorities.


== Learn ==
== Learn ==
Line 221: Line 227:
# Regularly Check Accounts: Monitor bank statements and account activities.
# Regularly Check Accounts: Monitor bank statements and account activities.
# Use Monitoring Services: Consider credit and identity theft monitoring services.
# Use Monitoring Services: Consider credit and identity theft monitoring services.
# Use Monitoring Apps: Little Snitch and Other options are broken down in [https://alternativeto.net/software/little-snitch/ AlternativeTo.net]
# Stay Updated: Follow reputable sources for security news.
# Stay Updated: Follow reputable sources for security news.