Cyber Incident Response Guide (Personal): Difference between revisions

fixed links
Line 1: Line 1:
= Cyber Incident Guide for Personal Use =
= Cyber Incident Guide for Personal Use =


Prevention is the best option!  
Prevention is the best option!
The [Digital Force Protection Guide|dfp-guide] can help you prevent this from happening as well as preparing backups for recovery.  
 
The [[DFP Guide]] can help you prevent this from happening and prepare backups for recovery.  


Reacting to a potential cyber incident on personal devices, accounts, and networks  
Reacting to a potential cyber incident on personal devices, accounts, and networks  
Line 113: Line 114:
=== Online Accounts ===
=== Online Accounts ===
Secure your online accounts immediately by taking the following steps:
Secure your online accounts immediately by taking the following steps:
* '''Change Passwords''': Update passwords for all critical accounts and store using a [[password manager|/resources/guides/dfp-guide/password-manager]].
* '''Change Passwords''': Update passwords for all critical accounts and store using a [[Password-manager]]
* '''Enable Multi-Factor Authentication''': Enhance security by enabling MFA. For guidance, see our [[MFA setup guide|/resources/guides/dfp-guide/mfa-guide#how-to-enable-mfa]].
* '''Enable Multi-Factor Authentication''': Enhance security by enabling MFA. For guidance, see our [[MFA Guide]]
* '''Search for a Data Breach''': Check your email on [https://haveibeenpwned.com|haveibeenpwned.com]; change authentication to any accounts identified or any accounts using the same password as the account in question.
* '''Search for a Data Breach''': Check your email on [https://haveibeenpwned.com|haveibeenpwned.com]; change authentication to any accounts identified or any accounts using the same password as the account in question.
* '''Specific Accounts to Secure''':
* '''Specific Accounts to Secure''':
Line 130: Line 131:
# '''Disconnect from the Internet''': Stop further unauthorized access.
# '''Disconnect from the Internet''': Stop further unauthorized access.
# '''Run a Malware Scan''': Check for and remove any malicious software.
# '''Run a Malware Scan''': Check for and remove any malicious software.
# '''Log Review''': Investigate security logs for any signs of compromise. [[Learn how to search log files|/resources/guides/incident-response-guide/searching-log-files.md]].
# '''Log Review''': Investigate security logs for any signs of compromise. [[How to Search Log Files]]


For more details, see the [[#Local_Hack|Local Hack]] section.
For more details, see the [[#Local_Hack|Local Hack]] section.


=== Network Security ===
=== Network Security ===
See the [[router hardening guide|router-hardening]].
See the [[Router Hardening]]


Ensure your network devices are secure by performing the following:
Ensure your network devices are secure by performing the following:
Line 145: Line 146:
=== Identify and Lock Down ===
=== Identify and Lock Down ===
Increase your defense against identity theft:
Increase your defense against identity theft:
# '''Credit Lock''': Freeze your credit with major credit bureaus to prevent new account openings. [[Credit Freeze Guide|https://inteltechniques.com/freeze.html]].
# '''Credit Lock''': Freeze your credit with major credit bureaus to prevent new account openings. [https://inteltechniques.com/freeze.html. https://inteltechniques.com/freeze.html.]
# '''Review Digital Footprint''': Check all online accounts for unauthorized access or transactions. [[Opt-Out Lists|https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List]].
# '''Review Digital Footprint''': Check all online accounts for unauthorized access or transactions. [https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List. https://github.com/yaelwrites/Big-Ass-Data-Broker-Opt-Out-List.]


# '''Security Settings''': Update and strengthen security settings on all connected devices.
# '''Security Settings''': Update and strengthen security settings on all connected devices.
Line 152: Line 153:
== Restore ==
== Restore ==
Recover from a cyber incident by restoring compromised systems and accounts:
Recover from a cyber incident by restoring compromised systems and accounts:
# '''Account Recovery''': Reset passwords and set up MFA. Consider using masked emails for sensitive accounts. [[password manager guide|/resources/guides/dfp-guide/password-manager]]. [[MFA setup guide|/resources/guides/dfp-guide/mfa-guide#how-to-enable-mfa]].
# '''Account Recovery''': Reset passwords and set up MFA. Consider using masked emails for sensitive accounts. [[MFA Guide]]
# '''Data Recovery''': Restore data from backups or use professional data recovery services if necessary.
# '''Data Recovery''': Restore data from backups or use professional data recovery services if necessary.
# '''System Reinstallation''': In cases of severe malware infection, reinstalling the operating system on affected devices may be required.
# '''System Reinstallation''': In cases of severe malware infection, reinstalling the operating system on affected devices may be required.
Line 164: Line 165:
== Learn ==
== Learn ==
Enhance your knowledge and preparedness for future incidents:
Enhance your knowledge and preparedness for future incidents:
* '''Incident Review''': Understand what happened and why. [[Learn from the incident|./incident-response-guide/learning-from-incident]].
* '''Incident Review''': Understand what happened and why. [[Learning from an Incident]]


[[Category:Cybersecurity]]
[[Category:Cybersecurity]]
[[Category:Incident Response]]
[[Category:Incident Response]]
[[Category:Guides]]
[[Category:Guides]]