STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM






Steps to be taken by Cyber-attack Victim

1.   Contain the Breach
The very first step you should take after a breach is to determine which servers have been compromised and to contain them as quickly as possible to ensure that other servers or devices won't also be infected.
Here are a few immediate things you can do to attempt to contain a data breach:
a. Disconnect your internet
b.  Disable remote access
c.   Maintain your firewall settings
d. Install any pending security updates or patches
e.   Change passwords
f.    You should change all affected or vulnerable passwords immediately. Create new, strong passwords for each account, and refrain from reusing the same passwords on multiple accounts. It's also important to strengthen your security by taking precautions like turning on two-factor authentication.
2.  Assess the Breach
 Whether you are part of a broader attack or the sole victim, you'll also need to determine the cause of the breach within your specific facility so you can work to help prevent the same kind of attack from happening again. Ask yourself:
a. Who has access to the servers that were infected?
b.  Which network connections were active when the breach occurred?
c.   How was the attack initiated?
3.    If you have cyber liability insurance, notify your carrier
Cyber liability insurance is designed to help you recover from a data breach or cyber security attack. Contact your carrier as soon as possible to see how they can help assist you with what to do after a cyber-attack. The costs associated with addressing future cyber incidents as well as identifying potential cyber exposures.

4.    Swap out any affected machines with unaffected ones.


5.  Do not unplug: Shutting down a machine can delete valuable information on how the hack originated and the extent of the damage.
6.    Call in a pro: Bringing in someone who specializes in cyberattacks is a good next step after identifying a hack. They’ll be able to determine important details including the scope of the damage that’s been done.

7.    Fix the gaps in your security:  Investing in firewall and intrusion prevention systems can give you another layer of security against the threat of cyberattacks.

8.    There are some others steps to follow: -
a. Disconnect and Detach
b.  In case of cyber bullying or cyber stalking, one should simply step away from the screen before proceeding to initiate legal action.
c.   you should immediately initiate steps like:
                                     i.    Freeze your bank accounts and credit cards
                                   ii.    Alter your Internet and mobile banking passwords
                                iii.    Take Legal Action
9.    Contact your local Cyber Crime Investigation Cell to file a written complaint against the cyber criminals. Provide detailed information about:
a. Nature of the crime
b.  Extent of damage
c.   Relevant documents, data, and other information relevant to the compliant
10. Inform your Contacts
Use social media to spread word about the incident. This simple step will minimise risk of your identity being misused to commit further crimes, and will ensure better awareness about cybercrime amongst your friends and relatives.
11. Use a full-service Internet security suite
Check the security set-up d access of service providers. Use real-time safeguard against existing d emerging malware including ransomware d viruses, Phishing, spammers.
12. Keep your software updated
Cybercriminals often use known defects, or error, in your software to gain entrance to your system.

13. Strengthen your home network
A VPN will encrypt all traffic leaving your devices until it arrives at its destination. If cybercriminals do control to hack your communication line, they won’t catch anything but encrypted data






Comments

Post a Comment

Popular posts from this blog

CYBER PROTECTION METHODS

TYPES OF CYBER THREATS AND CYBER ATTACKS