Secure After Malicious Action: Difference between revisions
expanded and formatted |
formatting |
||
Line 5: | Line 5: | ||
== Secure Your Devices and Accounts == | == Secure Your Devices and Accounts == | ||
Minimizing the damage caused by a cyber incident requires prompt action to secure your devices and accounts. Below are general guidelines and detailed steps | Minimizing the damage caused by a cyber incident requires prompt action to secure your devices and accounts. Below are general guidelines and detailed steps to strengthen your security posture. | ||
=== General Guidelines === | === General Guidelines === | ||
* | * '''Change All Passwords''': | ||
** Ensure all your accounts have strong and unique passwords. | |||
** Use a password manager to securely generate and store passwords. | |||
** Avoid reusing passwords across multiple accounts. | |||
* | * '''Enable Two-Factor Authentication (2FA)''': | ||
** Activate 2FA for all your accounts to add an additional layer of protection. | |||
** Choose app-based authentication (e.g., Google Authenticator, Authy) over SMS-based 2FA for enhanced security. | |||
* | * '''Update Software and Security Systems''': | ||
** Regularly update your operating systems, applications, and antivirus software to patch vulnerabilities. | |||
** Enable automatic updates wherever possible to stay protected from the latest threats. | |||
<span id="devices"></span> | <span id="devices"></span> | ||
Line 27: | Line 27: | ||
=== Steps to Secure Your Devices === | === Steps to Secure Your Devices === | ||
# '''Disconnect from the Internet''': | |||
** If you suspect a breach, immediately disconnect the affected device from all networks to limit the attack's spread. | |||
** Avoid connecting external devices (e.g., USB drives) that could also be infected. | |||
# '''Perform a Security Scan''': | |||
** Run a complete malware and virus scan using trusted antivirus software. | |||
** If malware is detected, follow the removal instructions provided by your security software. | |||
# '''Reset to Factory Settings (if necessary)''': | |||
** If the device is heavily compromised, consider performing a factory reset. | |||
** Ensure you back up critical data before resetting and scan backups for infections. | |||
# '''Encrypt Your Devices''': | |||
** Use full-disk encryption to protect sensitive data in case your device is lost or stolen. | |||
# '''Enable Firewalls and Security Features''': | |||
** Ensure firewalls are activated to block unauthorized access. | |||
** Use built-in security features like "Find My Device" for remote locking or wiping. | |||
<span id="accounts"></span> | <span id="accounts"></span> | ||
Line 52: | Line 52: | ||
=== Steps to Secure Your Accounts === | === Steps to Secure Your Accounts === | ||
# '''Audit Your Accounts''': | |||
** Review your accounts for unusual activity, such as login attempts from unknown locations or devices. | |||
** Remove access for any unrecognized third-party applications or integrations. | |||
# '''Change Passwords''': | |||
** Use strong, unique passwords for each account. | |||
** Avoid passwords that use dictionary words or common phrases. | |||
# '''Enable Account Recovery Options''': | |||
** Set up account recovery options, such as secondary email addresses and phone numbers, to regain access if needed. | |||
** Verify that recovery information is up-to-date and secure. | |||
# '''Enable Two-Factor Authentication''': | |||
** Use app-based 2FA for your most critical accounts, such as email, banking, and social media. | |||
** Consider hardware security keys (e.g., YubiKey) for enhanced protection. | |||
# '''Monitor Account Activity''': | |||
** Regularly check account activity logs for unusual access or actions. | |||
** Enable alerts for suspicious login attempts. | |||
# '''Deactivate or Delete Unused Accounts''': | |||
** Close accounts you no longer use to reduce potential attack surfaces. | |||
** Ensure data is securely removed before deactivating accounts. | |||
== Additional Resources == | == Additional Resources == | ||
* | * refer to the [[incident-response-guide|Incident Response Guide]] for further guidance on responding to incidents. | ||
* Consider using reputable online security platforms | * Consider using reputable online security platforms to monitor and manage your accounts and devices. | ||
== Conclusion == | == Conclusion == |