Cyber Incident Response Guide (Personal): Difference between revisions

From Irregularpedia
Jump to navigation Jump to search
→‎Prevention: bolded sections
formatting
Tag: 2017 source edit
Line 1: Line 1:
= Cyber Incident Guide for Personal Use =
= Cyber Incident Guide for Personal Use =
== Prevention ==
 
* [[#Prevention|'''Prevention''']]
== Overview ==
 
* [[#Prevention|Prevention]]
* [[#Identify|Identify]]
* [[#Identify|Identify]]
* [[#Secure|Secure]]
* [[#Secure|Secure]]
Line 8: Line 10:
* [[#Learn|Learn]]
* [[#Learn|Learn]]
* [[#Monitor|Monitor]]
* [[#Monitor|Monitor]]
Prevention is the best option! 


The [[DFP Guide]] can help you prevent this from happening and prepare backups for recovery.  
'''Prevention is the best option!''' The [[DFP Guide]] can help you prevent incidents and prepare backups for recovery.


Reacting to a potential cyber incident on personal devices, accounts, and networks  
This guide is designed to help you react to potential cyber incidents on personal devices, accounts, and networks. If you're feeling overwhelmed, don't worry—we'll walk you through each step.


== Identify the incident ==
== Prevention ==
The first step in responding to a cyber incident is identifying what happened. The steps you take may vary depending on the nature of the incident. Here are some guidelines to help you identify different types of cyber incidents:
 
* [[#Prevention|Prevention]]
Preventing cyber incidents is crucial. Follow best practices to secure your devices, accounts, and networks. Refer to the [[DFP Guide]] for detailed instructions.
* [[#Identify|'''Identify''']]
* [[#Secure|Secure]]
* [[#Restore|Restore]]
* [[#Report|Report]]
* [[#Learn|Learn]]
* [[#Monitor|Monitor]]


=== Possible Hack ===
== Identify ==
* Return to: [[#Identify_the_incident|Identify the Incident]]


==== HACK: Online ====
The first step is to '''identify''' what happened. Don't panic—we'll help you figure it out.


'''Q: Are you locked out of your account?'''
==== Possible Signs of a Cyber Incident ====
* If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section.
[[Cyber Incident Response Guide (Personal)#Online Accounts]]


'''Q: Is your financial account missing money?'''
===== Online Account Issues =====
* If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section.


'''Q: Are there changes or activities you didn't make in your accounts?'''
Ask yourself:
* If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section.


==== HACK: Local ====
* '''Are you locked out of your account?'''
* '''Is there money missing from your financial account?'''
* '''Do you see changes or activities in your accounts that you didn't make?'''


If you answer '''YES''' to any of these questions, proceed to [[#Secure Your Online Accounts]].


'''Q: Has your mouse moved or computer turned on without your control?'''
===== Device Behavior Issues =====
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.


'''Q: Did you get a ransomware message?'''
Ask yourself:
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.


'''Q: Did you get a fake anti-virus or update message?'''
* '''Is your computer acting on its own (e.g., mouse moving, unexpected restarts)?'''
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.
* '''Did you receive a ransomware message?'''
* '''Did you get a fake antivirus or update message?'''
* '''Have you noticed new plugins, toolbars, or applications that you didn't install?'''
* '''Is your device running slowly or behaving abnormally?'''
* '''Are you seeing unexpected pop-ups on your computer?'''
* '''Are your internet searches being redirected to unfamiliar sites?'''


'''Q: Have you noticed a plugin, toolbar, or application installed that you did not install?'''
If you answer '''YES''' to any of these questions, proceed to [[#Secure Your Local Devices]].
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.


'''Q: Is your device running slowly or behaving abnormally?'''
===== Data Leaks and Breaches =====
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.


'''Q: Pop-ups on the computer?'''
Ask yourself:
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.


'''Q: Are your internet searches being redirected?'''
* '''Has your private information (like photos or personal details) been shared online without your permission?'''
* If YES: Jump to [[#Local_Devices|Secure Local Devices]] section.
* '''Have personal images, videos, or other media been shared online without your consent?'''
* '''Have you received notifications from companies about a hack of their systems?'''
* '''Do you suspect a data breach involving your accounts?'''


=== Your Data ===
If you answer '''YES''' to any of these questions:
==== LEAK ====
* Return to: [[#Identify_the_incident|Identify the Incident]]


'''Q: Is your private information, like photos or personal details, shared online without your permission?'''
* Alert family and friends to be cautious of anyone pretending to be you.
* If YES: Alert family and friends to the leak and advise them to be cautious of anyone attempting to pretend to be you.
* Freeze your credit report to prevent identity theft.
* Freeze your credit report to prevent identity theft.
* Proceed to [[#Identify and Lock Down]] and [[#Secure Your Online Accounts]].
===== Social Engineering and Scams =====
'''Phishing Attempts'''
Ask yourself:
* '''Did you receive an email or message asking for personal or financial information?'''
* If '''YES''':
* Do not respond or click on any links.
* Mark the email as spam and delete it.
* '''Did you click on a suspicious link or download an attachment from an unknown source?'''
* If '''YES''', proceed to [[#Secure Your Devices and Network]].
'''Financial Scams'''
Ask yourself:
* '''Did someone request money or your banking information?'''
* If '''YES''':
* Be cautious. Scammers often pressure you using fear or urgency.
* Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/ common financial scams].
* '''Did you send money to someone you suspect is a scammer?'''
* If '''YES''':
* Stop all communication with the scammer.
* Report the incident to your local police department.
* File a complaint with the [https://reportfraud.ftc.gov/#/ FTC].
* '''Did you install anything provided by the scammer?'''
* If '''YES''', proceed to [[#Secure Your Devices and Network]].
* '''Did you give out personal or sensitive information?'''
* If '''YES''':
* Report the incident to your local police department.
* File a complaint with the [https://reportfraud.ftc.gov/#/ FTC].
* Proceed to [[#Identify and Lock Down]].
===== Accidents =====
Ask yourself:
* '''Has your device been lost or stolen?'''
* If '''YES''':
* Change passwords for your accounts and enable two-factor authentication.
* Try to locate the device using a tracking app or service.
* Consider remotely wiping the device to protect your data.
* '''Did you accidentally delete important files or information?'''
* If '''YES''', proceed to [[#Restore]] for data recovery steps.
== Secure ==
Now that you've identified a potential issue, let's '''secure''' your digital environment.


'''Q: Have personal images, video, or other media been shared online without your permission?'''
=== Secure Your Online Accounts ===
* If YES: Do not engage with the leaker. Identify the source of the leak and lock down the source of the leak. Identify the content that has been leaked. Identify direct links to the leaked content and store them for future reference.


==== BREACH ====
Take these steps immediately:


# '''Change Passwords''': Update passwords for all important accounts. Use a [[Password Manager]] to store them securely.


'''Q: Suspect Data Breach?'''
# '''Enable Multi-Factor Authentication (MFA)''': This adds an extra layer of security. See our [[MFA Guide]] for help.
* If YES:
** Check your email on [https://haveibeenpwnd.com Have I Been PWND]
** Jump to [[#Online Accounts|Secure Online Accounts]] section.


'''Q: Have you received any notifications from companies or organizations about a hack of their systems?'''
# '''Check for Data Breaches''': Visit [https://haveibeenpwned.com/ Have I Been Pwned] to see if your email has been compromised.
* If YES: Jump to [[#Online Accounts|Secure Online Accounts]] section.


=== Social Engineering ===
# '''Prioritize Critical Accounts''':
==== PHISHING ====
* Return to: [[#Identify_the_incident|Identify the Incident]]


'''Q: Did you receive an email or message requesting personal or financial information?'''
* '''Email Accounts''': Especially ones used for account recovery.
* If YES: Mark the email as spam and delete it.
* '''Financial Accounts''': Banks, credit cards, crypto wallets.
* '''Mobile Carrier Account''': To prevent SIM swapping.
* '''Social Media''': To prevent impersonation.


'''Q: Did you click on a suspicious link or download an attachment from an unknown source?'''
# '''Remove Personal Data from Data Brokers''': Use opt-out lists like the [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List Big Ass Data Broker Opt-Out List].
* If YES: Jump to [[#Secure_Your_Devices_and_Network|Secure Your Devices and Network]] section.


==== SCAM ====
=== Secure Your Local Devices ===
'''Q: Did someone request money or your banking information from you?'''
* If YES: Be cautious. Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/|common finance scams].
* Scammers may pressure you to lower your guard with fear, desire, stress, greed, and other emotions.


'''Q: Did you send money to the scammer?'''
Take these steps to secure your devices:
* If YES: Consider the money gone, and do not pay the scammer again. Report the incident to the local police department and [https://reportfraud.ftc.gov/#/|file a complaint with the FTC].


'''Q: Did you install anything from the scammer?'''
# '''Disconnect from the Internet''': Unplug your network cable or turn off Wi-Fi to prevent further unauthorized access.
* If YES: Jump to [[#Secure_Your_Devices_and_Network|Secure Your Devices and Network]] section.


'''Q: Did you give the scammer any personal or sensitive information?'''
# '''Run a Malware Scan''': Use reputable antivirus software to scan and remove any threats.
* If YES: Immediately report the incident to the local police department and [https://reportfraud.ftc.gov/#/|file a complaint with the FTC].


=== ACCIDENT ===
# '''Update Your Software''': Ensure your operating system and applications are up to date.


# '''Review Installed Programs''': Uninstall any software you don't recognize.


'''Q: Has your device been stolen?'''
# '''Check Your Browser Extensions''': Remove any unfamiliar plugins or toolbars.
* If YES: Immediately change all passwords for your accounts and enable two-factor authentication for all your accounts connected to the device. Attempt to locate the device using a tracking app or service. Consider factory resetting the device and wiping all data if necessary.


'''Q: Did you accidentally delete important files or information?'''
# '''Change Your Device Passwords''': Use strong, unique passwords.
* If YES: Refer to the [[#Restore|Restore]] section for steps on data recovery.


== Secure ==
# '''Consider Professional Help''': If you're unsure, seek assistance from a trusted professional.
* [[#Prevention|Prevention]]
 
* [[#Identify|Identify]]
=== Secure Your Network ===
* [[#Secure|'''Secure''']]
* [[#Restore|Restore]]
* [[#Report|Report]]
* [[#Learn|Learn]]
* [[#Monitor|Monitor]]
After identifying the nature of the cyber incident, take the necessary steps to secure your digital environment. Return to [[#Identify_the_incident|Identify the Incident]] for further guidance.


=== Online Accounts ===
Ensure your network is safe:
Secure your online accounts immediately by taking the following steps:
* '''Change Passwords''': Update passwords for all critical accounts and store using a [[Password-manager]]
* '''Enable Multi-Factor Authentication''': Enhance security by enabling MFA. For guidance, see our [[MFA Guide]]
* '''Search for a Data Breach''': Check your email on  [https://haveibeenpwnd.com Have I Been PWND] change authentication to any accounts identified or any accounts using the same password as the account in question.
* '''Specific Accounts to Secure''':
** '''Email Accounts''': Prioritize accounts used for account recovery.
** '''Finance and Banking''': High-value targets, especially crypto accounts.
** '''Mobile Carrier''': Secure to prevent SIM swapping.
** '''Social Media''': Prevent impersonation and fraud.


* Remove Online Data Opt-Out Lists [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List%7Chere BADBOLC Github Repo].
# '''Change Router Passwords''': Update the default login credentials.


Review additional measures in the [[#Online_Account_Hack|Online Account Hack]] section.
# '''Update Router Firmware''': Install the latest firmware updates.


=== Local Devices ===
# '''Disable Remote Management''': Prevent external access to your router settings.
Take immediate action to secure and analyze your local devices:
# '''Disconnect from the Internet''': Stop further unauthorized access.
# '''Run a Malware Scan''': Check for and remove any malicious software.
# '''Log Review''': Investigate security logs for any signs of compromise. [[How to Search Log Files]]


For more details, see the [[#HACK:_Local|Local Hack]] section.
# '''Set Up a Guest Wi-Fi Network''': Isolate your main devices from guests.


=== Network Security ===
# '''Monitor Network Traffic''': Use tools to detect unusual activity.
See the [[Router Hardening]]


Ensure your network devices are secure by performing the following:
# '''Refer to the [[Router Hardening]] Guide''' for detailed steps.
# '''Password Update''': Change passwords for routers and Wi-Fi networks.
# '''Firmware Update''': Keep your network devices updated with the latest firmware.
# '''Disable Remote Management''': Prevent external access to your network devices.
# '''Monitor Traffic''': Watch for unusual activity that might indicate a breach.


=== Identify and Lock Down ===
=== Identify and Lock Down ===
Increase your defense against identity theft:
# '''Credit Lock''': Freeze your credit with major credit bureaus to prevent new account openings. [https://inteltechniques.com/freeze.html. https://inteltechniques.com/freeze.html.]
# '''Review Digital Footprint''': Check all online accounts for unauthorized access or transactions. [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List. https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List.]


# '''Security Settings''': Update and strengthen security settings on all connected devices.
Protect yourself from identity theft:
 
# '''Freeze Your Credit''': Contact major credit bureaus to freeze your credit. See [https://inteltechniques.com/freeze.html IntelTechniques Credit Freeze Guide].
 
# '''Review Financial Statements''': Look for unauthorized transactions.
 
# '''Update Security Settings''': Strengthen privacy and security settings on all accounts.
 
# '''Remove Unnecessary Personal Information''': From social media and other online platforms.


== Restore ==
== Restore ==
* [[#Prevention|Prevention]]
 
* [[#Identify|Identify]]
Recover from the incident:
* [[#Secure|Secure]]
 
* [[#Restore|'''Restore''']]
# '''Account Recovery''':
* [[#Report|Report]]
 
* [[#Learn|Learn]]
* Reset passwords and security questions.
* [[#Monitor|Monitor]]
* Use masked emails for sensitive accounts.
Recover from a cyber incident by restoring compromised systems and accounts:
 
# '''Account Recovery''': Reset passwords and set up MFA. Consider using masked emails for sensitive accounts. [[MFA Guide]]
# '''Data Recovery''':
# '''Data Recovery''': Restore data from backups or use professional data recovery services if necessary.
 
# '''System Reinstallation''': In cases of severe malware infection, reinstalling the operating system on affected devices may be required.
* Restore files from backups if available.
* Use data recovery software or consult a professional.
 
# '''Reinstall Operating System''':
 
* In severe cases, consider reinstalling your OS to ensure all malware is removed.


== Report ==
== Report ==
* [[#Prevention|Prevention]]
 
* [[#Identify|Identify]]
Reporting helps prevent future incidents:
* [[#Secure|Secure]]
 
* [[#Restore|Restore]]
# '''Contact Financial Institutions''': Inform them of any unauthorized activity.
* [[#Report|'''Report''']]
 
* [[#Learn|Learn]]
# '''Report to Law Enforcement''': File a report with your local police department.
* [[#Monitor|Monitor]]
 
It’s crucial to report any cyber incident to help prevent future occurrences:
# '''Notify Affected Parties''': Let friends and family know if they might be impacted.
# '''Financial Institutions''': Inform your bank or credit card issuer about any unauthorized transactions.
 
# '''Law Enforcement''': Report identity theft and other cybercrimes to the police.
# '''File Complaints''':
# '''Notify Affected Parties''': If others are impacted by the breach, inform them to take protective measures.
 
* With the [https://reportfraud.ftc.gov/#/ FTC] for scams and fraud.
* With other relevant authorities.


== Learn ==
== Learn ==
* [[#Prevention|Prevention]]
 
* [[#Identify|Identify]]
Understand and learn from the incident:
* [[#Secure|Secure]]
 
* [[#Restore|Restore]]
# '''Review What Happened''': Identify how the incident occurred.
* [[#Report|Report]]
 
* [[#Learn|'''Learn''']]
# '''Educate Yourself''': Read about best security practices.
* [[#Monitor|Monitor]]
 
Enhance your knowledge and preparedness for future incidents:
# '''Implement Preventive Measures''': Update your habits and tools to enhance security.
* '''Incident Review''': Understand what happened and why. [[Learning from an Incident]]
 
== Monitor ==
 
Keep an eye out to prevent future incidents:
 
# '''Regularly Check Accounts''': Monitor bank statements and account activities.
 
# '''Use Monitoring Services''': Consider credit and identity theft monitoring services.
 
# '''Stay Updated''': Follow reputable sources for security news.


[[Category:Cybersecurity]]
[[Category:Cybersecurity]]

Revision as of 03:06, 21 November 2024

Cyber Incident Guide for Personal Use

Overview

Prevention is the best option! The DFP Guide can help you prevent incidents and prepare backups for recovery.

This guide is designed to help you react to potential cyber incidents on personal devices, accounts, and networks. If you're feeling overwhelmed, don't worry—we'll walk you through each step.

Prevention

Preventing cyber incidents is crucial. Follow best practices to secure your devices, accounts, and networks. Refer to the DFP Guide for detailed instructions.

Identify

The first step is to identify what happened. Don't panic—we'll help you figure it out.

Possible Signs of a Cyber Incident

Online Account Issues

Ask yourself:

  • Are you locked out of your account?
  • Is there money missing from your financial account?
  • Do you see changes or activities in your accounts that you didn't make?

If you answer YES to any of these questions, proceed to #Secure Your Online Accounts.

Device Behavior Issues

Ask yourself:

  • Is your computer acting on its own (e.g., mouse moving, unexpected restarts)?
  • Did you receive a ransomware message?
  • Did you get a fake antivirus or update message?
  • Have you noticed new plugins, toolbars, or applications that you didn't install?
  • Is your device running slowly or behaving abnormally?
  • Are you seeing unexpected pop-ups on your computer?
  • Are your internet searches being redirected to unfamiliar sites?

If you answer YES to any of these questions, proceed to #Secure Your Local Devices.

Data Leaks and Breaches

Ask yourself:

  • Has your private information (like photos or personal details) been shared online without your permission?
  • Have personal images, videos, or other media been shared online without your consent?
  • Have you received notifications from companies about a hack of their systems?
  • Do you suspect a data breach involving your accounts?

If you answer YES to any of these questions:

Social Engineering and Scams

Phishing Attempts

Ask yourself:

  • Did you receive an email or message asking for personal or financial information?
  • If YES:
  • Do not respond or click on any links.
  • Mark the email as spam and delete it.
  • Did you click on a suspicious link or download an attachment from an unknown source?

Financial Scams

Ask yourself:

  • Did someone request money or your banking information?
  • Did you send money to someone you suspect is a scammer?
  • If YES:
  • Stop all communication with the scammer.
  • Report the incident to your local police department.
  • File a complaint with the FTC.
  • Did you install anything provided by the scammer?
  • Did you give out personal or sensitive information?
Accidents

Ask yourself:

  • Has your device been lost or stolen?
  • If YES:
  • Change passwords for your accounts and enable two-factor authentication.
  • Try to locate the device using a tracking app or service.
  • Consider remotely wiping the device to protect your data.
  • Did you accidentally delete important files or information?
  • If YES, proceed to #Restore for data recovery steps.

Secure

Now that you've identified a potential issue, let's secure your digital environment.

Secure Your Online Accounts

Take these steps immediately:

  1. Change Passwords: Update passwords for all important accounts. Use a Password Manager to store them securely.
  1. Enable Multi-Factor Authentication (MFA): This adds an extra layer of security. See our MFA Guide for help.
  1. Check for Data Breaches: Visit Have I Been Pwned to see if your email has been compromised.
  1. Prioritize Critical Accounts:
  • Email Accounts: Especially ones used for account recovery.
  • Financial Accounts: Banks, credit cards, crypto wallets.
  • Mobile Carrier Account: To prevent SIM swapping.
  • Social Media: To prevent impersonation.
  1. Remove Personal Data from Data Brokers: Use opt-out lists like the Big Ass Data Broker Opt-Out List.

Secure Your Local Devices

Take these steps to secure your devices:

  1. Disconnect from the Internet: Unplug your network cable or turn off Wi-Fi to prevent further unauthorized access.
  1. Run a Malware Scan: Use reputable antivirus software to scan and remove any threats.
  1. Update Your Software: Ensure your operating system and applications are up to date.
  1. Review Installed Programs: Uninstall any software you don't recognize.
  1. Check Your Browser Extensions: Remove any unfamiliar plugins or toolbars.
  1. Change Your Device Passwords: Use strong, unique passwords.
  1. Consider Professional Help: If you're unsure, seek assistance from a trusted professional.

Secure Your Network

Ensure your network is safe:

  1. Change Router Passwords: Update the default login credentials.
  1. Update Router Firmware: Install the latest firmware updates.
  1. Disable Remote Management: Prevent external access to your router settings.
  1. Set Up a Guest Wi-Fi Network: Isolate your main devices from guests.
  1. Monitor Network Traffic: Use tools to detect unusual activity.
  1. Refer to the Router Hardening Guide for detailed steps.

Identify and Lock Down

Protect yourself from identity theft:

  1. Freeze Your Credit: Contact major credit bureaus to freeze your credit. See IntelTechniques Credit Freeze Guide.
  1. Review Financial Statements: Look for unauthorized transactions.
  1. Update Security Settings: Strengthen privacy and security settings on all accounts.
  1. Remove Unnecessary Personal Information: From social media and other online platforms.

Restore

Recover from the incident:

  1. Account Recovery:
  • Reset passwords and security questions.
  • Use masked emails for sensitive accounts.
  1. Data Recovery:
  • Restore files from backups if available.
  • Use data recovery software or consult a professional.
  1. Reinstall Operating System:
  • In severe cases, consider reinstalling your OS to ensure all malware is removed.

Report

Reporting helps prevent future incidents:

  1. Contact Financial Institutions: Inform them of any unauthorized activity.
  1. Report to Law Enforcement: File a report with your local police department.
  1. Notify Affected Parties: Let friends and family know if they might be impacted.
  1. File Complaints:
  • With the FTC for scams and fraud.
  • With other relevant authorities.

Learn

Understand and learn from the incident:

  1. Review What Happened: Identify how the incident occurred.
  1. Educate Yourself: Read about best security practices.
  1. Implement Preventive Measures: Update your habits and tools to enhance security.

Monitor

Keep an eye out to prevent future incidents:

  1. Regularly Check Accounts: Monitor bank statements and account activities.
  1. Use Monitoring Services: Consider credit and identity theft monitoring services.
  1. Stay Updated: Follow reputable sources for security news.