Cyber Incident Response Guide (Personal): Difference between revisions
m Sac moved page Incident-response-guide to Cyber Incident Response Guide (Personal) |
fixed links |
||
Line 1: | Line 1: | ||
= Cyber Incident Guide for Personal Use = | = Cyber Incident Guide for Personal Use = | ||
Prevention is the best option! | Prevention is the best option! | ||
The [ | |||
The [[DFP Guide]] can help you prevent this from happening and prepare backups for recovery. | |||
Reacting to a potential cyber incident on personal devices, accounts, and networks | Reacting to a potential cyber incident on personal devices, accounts, and networks | ||
Line 113: | Line 114: | ||
=== Online Accounts === | === Online Accounts === | ||
Secure your online accounts immediately by taking the following steps: | Secure your online accounts immediately by taking the following steps: | ||
* '''Change Passwords''': Update passwords for all critical accounts and store using a [[ | * '''Change Passwords''': Update passwords for all critical accounts and store using a [[Password-manager]] | ||
* '''Enable Multi-Factor Authentication''': Enhance security by enabling MFA. For guidance, see our [[MFA | * '''Enable Multi-Factor Authentication''': Enhance security by enabling MFA. For guidance, see our [[MFA Guide]] | ||
* '''Search for a Data Breach''': Check your email on [https://haveibeenpwned.com|haveibeenpwned.com]; change authentication to any accounts identified or any accounts using the same password as the account in question. | * '''Search for a Data Breach''': Check your email on [https://haveibeenpwned.com|haveibeenpwned.com]; change authentication to any accounts identified or any accounts using the same password as the account in question. | ||
* '''Specific Accounts to Secure''': | * '''Specific Accounts to Secure''': | ||
Line 130: | Line 131: | ||
# '''Disconnect from the Internet''': Stop further unauthorized access. | # '''Disconnect from the Internet''': Stop further unauthorized access. | ||
# '''Run a Malware Scan''': Check for and remove any malicious software. | # '''Run a Malware Scan''': Check for and remove any malicious software. | ||
# '''Log Review''': Investigate security logs for any signs of compromise. [[ | # '''Log Review''': Investigate security logs for any signs of compromise. [[How to Search Log Files]] | ||
For more details, see the [[#Local_Hack|Local Hack]] section. | For more details, see the [[#Local_Hack|Local Hack]] section. | ||
=== Network Security === | === Network Security === | ||
See the [[ | See the [[Router Hardening]] | ||
Ensure your network devices are secure by performing the following: | Ensure your network devices are secure by performing the following: | ||
Line 145: | Line 146: | ||
=== Identify and Lock Down === | === Identify and Lock Down === | ||
Increase your defense against identity theft: | Increase your defense against identity theft: | ||
# '''Credit Lock''': Freeze your credit with major credit bureaus to prevent new account openings. [ | # '''Credit Lock''': Freeze your credit with major credit bureaus to prevent new account openings. [https://inteltechniques.com/freeze.html. https://inteltechniques.com/freeze.html.] | ||
# '''Review Digital Footprint''': Check all online accounts for unauthorized access or transactions. [ | # '''Review Digital Footprint''': Check all online accounts for unauthorized access or transactions. [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List. https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List.] | ||
# '''Security Settings''': Update and strengthen security settings on all connected devices. | # '''Security Settings''': Update and strengthen security settings on all connected devices. | ||
Line 152: | Line 153: | ||
== Restore == | == Restore == | ||
Recover from a cyber incident by restoring compromised systems and accounts: | Recover from a cyber incident by restoring compromised systems and accounts: | ||
# '''Account Recovery''': Reset passwords and set up MFA. Consider using masked emails for sensitive accounts | # '''Account Recovery''': Reset passwords and set up MFA. Consider using masked emails for sensitive accounts. [[MFA Guide]] | ||
# '''Data Recovery''': Restore data from backups or use professional data recovery services if necessary. | # '''Data Recovery''': Restore data from backups or use professional data recovery services if necessary. | ||
# '''System Reinstallation''': In cases of severe malware infection, reinstalling the operating system on affected devices may be required. | # '''System Reinstallation''': In cases of severe malware infection, reinstalling the operating system on affected devices may be required. | ||
Line 164: | Line 165: | ||
== Learn == | == Learn == | ||
Enhance your knowledge and preparedness for future incidents: | Enhance your knowledge and preparedness for future incidents: | ||
* '''Incident Review''': Understand what happened and why. [[ | * '''Incident Review''': Understand what happened and why. [[Learning from an Incident]] | ||
[[Category:Cybersecurity]] | [[Category:Cybersecurity]] | ||
[[Category:Incident Response]] | [[Category:Incident Response]] | ||
[[Category:Guides]] | [[Category:Guides]] |