Cyber Incident Response Guide (Personal): Difference between revisions
headers under identify |
subheaders for identify |
||
Line 56: | Line 56: | ||
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section. | * If YES: Jump to [[#Local_Devices|Secure Local Devices]] section. | ||
=== Your Data === | |||
==== LEAK ==== | ==== LEAK ==== | ||
* Return to: [[#Identify_the_incident|Identify the Incident]] | * Return to: [[#Identify_the_incident|Identify the Incident]] | ||
Line 77: | Line 78: | ||
* If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section. | * If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section. | ||
=== Social Engineering === | |||
==== PHISHING ==== | ==== PHISHING ==== | ||
* Return to: [[#Identify_the_incident|Identify the Incident]] | * Return to: [[#Identify_the_incident|Identify the Incident]] | ||
Line 100: | Line 102: | ||
* If YES: Immediately report the incident to the local police department and [https://reportfraud.ftc.gov/#/|file a complaint with the FTC]. | * If YES: Immediately report the incident to the local police department and [https://reportfraud.ftc.gov/#/|file a complaint with the FTC]. | ||
=== ACCIDENT === | |||