Cyber Incident Response Guide (Personal): Difference between revisions
bullets |
bullet echelons |
||
Line 89: | Line 89: | ||
** Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message. | ** Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message. | ||
* If '''NO''', remain vigilant against suspicious communications. | |||
* If you're '''UNSURE''', verify the sender's identity through another communication channel before taking action. | |||
'''Financial Scams''' | '''Financial Scams''' | ||
Line 104: | Line 104: | ||
** Proceed to report the incident if necessary. | ** Proceed to report the incident if necessary. | ||
* If '''NO''', stay alert for unusual requests for money or information. | |||
* If you're '''UNSURE''', consult with someone trustworthy before proceeding with any requests. | |||
===== Accidents ===== | ===== Accidents ===== | ||
Line 119: | Line 119: | ||
** Consider remotely wiping the device to protect your data. | ** Consider remotely wiping the device to protect your data. | ||
* If '''NO''', ensure that tracking features are enabled on all devices as a precaution. | |||
* If you're '''UNSURE''', check recent locations if tracking was enabled previously. | |||
* '''Did you accidentally delete important files or information?''' | * '''Did you accidentally delete important files or information?''' | ||
Line 127: | Line 127: | ||
** If '''YES''', proceed to [[#Restore]] for data recovery steps. | ** If '''YES''', proceed to [[#Restore]] for data recovery steps. | ||
* If '''NO''', consider setting up regular backups to prevent future data loss issues. | |||
* If you're '''UNSURE''', check if the files are in the recycle bin or use recovery software as needed. | |||
===== Log File Analysis ===== | ===== Log File Analysis ===== |