Cyber Incident Response Guide (Personal): Difference between revisions
→Monitor: added little snitch to monitoring |
bullet format |
||
Line 85: | Line 85: | ||
** If '''YES''': | ** If '''YES''': | ||
** Do not respond or click on any links. | |||
** Mark the email as spam and delete it. | |||
** Proceed to [[#Secure Your Devices and Network]] if you've interacted with the message. | |||
** If '''NO''', remain vigilant against suspicious communications. | ** If '''NO''', remain vigilant against suspicious communications. | ||
Line 100: | Line 100: | ||
** If '''YES''': | ** If '''YES''': | ||
** Be cautious. Scammers often pressure you using fear or urgency. | |||
** Read about [http://www.consumerfinance.gov/ask-cfpb/what-are-some-common-types-of-scams-en-2092/ common financial scams]. | |||
** Proceed to report the incident if necessary. | |||
** If '''NO''', stay alert for unusual requests for money or information. | ** If '''NO''', stay alert for unusual requests for money or information. | ||
Line 115: | Line 115: | ||
** If '''YES''': | ** If '''YES''': | ||
** Change passwords for your accounts and enable two-factor authentication. | |||
** Try to locate the device using a tracking app or service. | |||
** Consider remotely wiping the device to protect your data. | |||
** If '''NO''', ensure that tracking features are enabled on all devices as a precaution. | ** If '''NO''', ensure that tracking features are enabled on all devices as a precaution. |