Five steps to take when you suspect you are a victim of a cyber attack

from IAWatch

Step 1: Contact your IT leader.

Step 2: Assess if your system has been penetrated.

Step 3: Detect the extent of the hack.

Step 4: Notify clients – be aware of your state’s laws regarding alerting a client when you’ve suffered a breach involving their data.

Step 5: Conduct a post-mortem.

 

Advertisements
This entry was posted in Uncategorized and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s