STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM

Steps
to be taken by Cyber-attack Victim
1. Contain the Breach
The very first step you should take after a breach is to determine which servers have been compromised and to contain them as quickly as possible to ensure that other servers or devices won't also be infected.
The very first step you should take after a breach is to determine which servers have been compromised and to contain them as quickly as possible to ensure that other servers or devices won't also be infected.
Here are a few immediate things you can
do to attempt to contain a data breach:
a. Disconnect
your internet
b. Disable
remote access
c.
Maintain your firewall settings
d. Install
any pending security updates or patches
e.
Change passwords
f.
You should change all affected or vulnerable
passwords immediately. Create new, strong passwords for each account,
and refrain from reusing the same passwords on multiple accounts. It's also
important to strengthen your security by taking precautions like turning on
two-factor authentication.
2. Assess
the Breach
Whether you are part of a broader attack or the sole victim, you'll also need to determine the cause of the breach within your specific facility so you can work to help prevent the same kind of attack from happening again. Ask yourself:
Whether you are part of a broader attack or the sole victim, you'll also need to determine the cause of the breach within your specific facility so you can work to help prevent the same kind of attack from happening again. Ask yourself:
a. Who
has access to the servers that were infected?
b. Which
network connections were active when the breach occurred?
c.
How was the attack initiated?
3. If
you have cyber liability insurance, notify your carrier
Cyber liability insurance is
designed to help you recover from a data breach or cyber security attack.
Contact your carrier as soon as possible to see how they can help assist you
with what to do after a cyber-attack. The costs associated with addressing
future cyber incidents as well as identifying potential cyber
exposures.
4. Swap
out any affected machines with unaffected ones.
5. Do
not unplug: Shutting
down a machine can delete valuable information on how the hack
originated and the extent of the damage.
6. Call
in a pro:
Bringing in someone who specializes in cyberattacks is a good next
step after identifying a hack. They’ll be able to determine important details
including the scope of the damage that’s been done.
7. Fix
the gaps in your security: Investing in firewall and intrusion prevention
systems can give you another layer of security against the threat of
cyberattacks.
8. There
are some others steps to follow: -
a. Disconnect
and Detach
b. In
case of cyber bullying or cyber stalking, one should simply step away from the
screen before proceeding to initiate legal action.
c.
you should immediately initiate steps like:
i. Freeze
your bank accounts and credit cards
ii. Alter
your Internet and mobile banking passwords
iii. Take
Legal Action
9. Contact
your local Cyber Crime Investigation Cell to file a written complaint against
the cyber criminals. Provide detailed information about:
a. Nature
of the crime
b. Extent
of damage
c.
Relevant documents, data, and other
information relevant to the compliant
10. Inform
your Contacts
Use social media to spread word about
the incident. This simple step will minimise risk of your identity being
misused to commit further crimes, and will ensure better awareness about cybercrime
amongst your friends and relatives.
11. Use
a full-service Internet security suite
Check the security set-up d access of
service providers. Use real-time safeguard against existing d emerging malware
including ransomware d viruses, Phishing, spammers.
12. Keep
your software updated
Cybercriminals often use known defects,
or error, in your software to gain entrance to your system.
13. Strengthen
your home network
A VPN will encrypt all traffic leaving
your devices until it arrives at its destination. If cybercriminals do control
to hack your communication line, they won’t catch anything but encrypted data
Will surely spread this useful content..
ReplyDeleteReally helpful
ReplyDeleteDid a nice reasearch on this, good job
ReplyDeleteGreat work
ReplyDeletePerfect workkkkk
ReplyDeleteIt's so thoughtful to create a content on this topic, great work👍🏻
ReplyDeleteGreat step to avoid the cyber threat
ReplyDeleteGreat
ReplyDeletebahut acha ��
ReplyDeleteVery important for todays generation
ReplyDeleteInformative
ReplyDeleteThank s
ReplyDelete