Incident Response

What to do when something goes wrong.

Recognizing a Security Incident

Before you can respond, you need to identify that something has happened:

Incident TypeSigns
Account compromiseUnexpected password changes, login alerts
Malware infectionSlow device, strange behavior, ransom message
Identity theftUnfamiliar accounts, unexpected bills
Data breach notificationEmail from company about breach
Phishing successEntered credentials on fake site
Device theftMissing phone, laptop, tablet
Financial fraudUnauthorized transactions

General Response Framework

For any security incident, follow these steps:

StepActionPurpose
1. Stay calmDon't panicClear thinking required
2. ContainLimit further damageStop the bleeding
3. DocumentScreenshot, note timesEvidence for later
4. AssessDetermine scopeKnow what's affected
5. RemediateFix the problemRemove threat
6. RecoverRestore normal operationsGet back to normal
7. LearnPrevent recurrenceImprove security

Account Compromise

Signs of Account Compromise

SignWhat It Means
Password changed (not by you)Attacker has access
Login from unknown locationSomeone else logged in
Messages sent you didn't writeAttacker using account
Account recovery changedAttacker locking you out
New devices logged inAttacker's device added
Missing emailsAttacker deleting evidence

Immediate Response

StepAction
1Change password immediately (from clean device)
2Enable or strengthen 2FA
3Check and remove unknown devices
4Review account recovery options
5Check for forwarding rules (email)
6Review recent activity
7Change passwords for related accounts

If Locked Out

StepAction
1Use account recovery option
2Use backup codes if available
3Contact platform support
4Prepare identity verification
5Document timeline for support

After Regaining Access

TaskPurpose
Enable 2FAPrevent future compromise
Review all settingsCheck for malicious changes
Check connected appsRemove unknown connections
Update recovery optionsEnsure you can recover
Change password on reused sitesContain damage

Malware Infection

Signs of Malware

SignType Indicated
Ransom messageRansomware
Pop-up ads everywhereAdware
Very slow performanceCryptominer, general malware
Programs launching on their ownTrojan, RAT
Antivirus disabledSophisticated malware
Unknown programs installedVarious malware
High network usageData theft, botnet

Immediate Response

StepAction
1Disconnect from network (unplug ethernet, disable WiFi)
2Don't turn off device (preserve evidence)
3Note any messages or ransom demands
4Document what happened

Malware Removal

StepAction
1Boot into Safe Mode
2Run antimalware scan
3Use second-opinion scanner
4Remove identified threats
5Check startup programs
6Run additional scans
7Update all software

When to Reinstall

SituationRecommendation
RansomwareWipe and reinstall
Rootkit detectedWipe and reinstall
Unknown infection severityConsider reinstall
Sensitive data on deviceReinstall for certainty
Repeated reinfectionReinstall, investigate source

Ransomware Specific Response

StepAction
1Disconnect immediately
2Document ransom message
3Check NoMoreRansom.org for decryptor
4Report to authorities (ic3.gov)
5Restore from backup (if available)
6Do not pay (usually)
7Wipe and reinstall

Identity Theft

Signs of Identity Theft

SignMeaning
Unfamiliar accounts on credit reportSomeone opened accounts in your name
Collection calls for unknown debtsFraudulent accounts went unpaid
Medical bills for services not receivedMedical identity theft
IRS notification about multiple returnsTax identity theft
Mail for accounts you didn't openNew fraudulent accounts
Denied credit unexpectedlyCredit damaged by fraud

Immediate Response

StepAction
1Place fraud alert with one credit bureau
2Review credit reports from all three bureaus
3Freeze credit at all bureaus
4Report to identitytheft.gov
5File police report
6Contact fraud departments of affected companies
7Document everything

Credit Bureau Contact Information

BureauFraud AlertFreeze
Equifax1-800-525-6285equifax.com/personal/credit-report-services/credit-freeze/
Experian1-888-397-3742experian.com/freeze/
TransUnion1-800-680-7289transunion.com/credit-freeze

Note: Placing a fraud alert with one bureau notifies all three. Freezes must be done separately.

Long-Term Recovery

TaskTimeline
Dispute fraudulent accountsOngoing as discovered
Follow up on disputes30-45 days for response
Monitor credit reportsWeekly initially, then monthly
Consider identity theft protectionIf not using freeze
Keep records7+ years
File taxes earlyPrevent tax ID theft

Financial Fraud

Signs of Financial Fraud

SignType
Unauthorized transactionsCredit card or bank fraud
Missing moneyAccount compromise
Unauthorized transfersWire fraud
New accounts you didn't openIdentity theft
Changed account informationAccount takeover

Immediate Response for Card Fraud

StepAction
1Call bank/card issuer immediately
2Report unauthorized charges
3Cancel card, get new number
4Review recent statements
5Document all fraud
6File dispute for charges
7Monitor account activity

Immediate Response for Bank Account Fraud

StepAction
1Contact bank immediately
2Freeze account if possible
3Change online banking password
4Review all recent transactions
5File fraud report with bank
6Request new account number
7Update automatic payments

Fraud Recovery Rights

TypeProtection
Credit card fraud$50 max liability (often $0)
Debit card fraud$50 if reported in 2 days, more after
Unauthorized ACH60 days to report
Check fraudVaries by bank

Data Breach Response

When You Receive Breach Notification

StepAction
1Read notification carefully (what was exposed?)
2Change password for that service
3Change password anywhere it was reused
4Enable 2FA if not already enabled
5Monitor for unusual activity
6Consider credit freeze if SSN exposed
7Watch for phishing using breach info

What to Do Based on Data Exposed

Data ExposedActions Needed
Email onlyWatch for phishing, change password
Email + passwordChange everywhere, enable 2FA
Financial dataMonitor accounts, consider new card
SSNFreeze credit, monitor credit reports
Medical recordsReview EOBs, watch for medical ID theft

Credit Monitoring After Breach

OptionWhen to Use
Free monitoring from breached companyAccept if offered
Credit freezeBest protection for SSN exposure
Free annual credit reportsannualcreditreport.com
Paid credit monitoringIf not using freeze

Lost or Stolen Device

Immediate Response

StepAction
1Try to locate (Find My iPhone/Android)
2Mark as lost if feature available
3Remote wipe if definitely stolen
4Change passwords for accounts on device
5Contact carrier to suspend SIM
6Report theft to police
7Remove device from account trusted devices

Accounts to Secure

PriorityAccount
HighestEmail (gateway to others)
HighestBanking apps
HighPassword manager (if not requiring password)
HighSocial media
MediumShopping sites with saved cards
MediumCloud storage

Insurance and Replacement

TaskDetails
File police reportRequired for some insurance
Contact insuranceHomeowners or device insurance
Document everythingSerial numbers, IMEI
Consider remote wipeProtect data

Reporting Incidents

Where to Report

Incident TypeReport To
Internet crimeic3.gov (FBI)
Identity theftidentitytheft.gov (FTC)
Fraudreportfraud.ftc.gov
Data breach affecting youState attorney general
Child exploitationCyberTipline.org (NCMEC)
IRS impersonationphishing@irs.gov
Local crimeLocal police

Information to Include in Reports

InformationWhy Needed
Timeline of eventsUnderstand what happened
ScreenshotsEvidence
Email headersTrace source
Financial impactDamage assessment
Accounts affectedScope of incident
Steps already takenKnow current status

Post-Incident Actions

Immediate Aftermath

TaskPurpose
Change all potentially affected passwordsPrevent further access
Enable 2FA everywherePrevent future incidents
Run malware scansEnsure devices are clean
Review account activityFind any missed compromise
Update security softwareClose vulnerabilities

Learning from the Incident

QuestionWhat to Improve
How did this happen?Address root cause
What warning signs were missed?Improve detection
What slowed response?Prepare for next time
What data/access was at risk?Reduce exposure
Were backups helpful?Improve backup strategy

Preventing Recurrence

ImprovementBenefit
Enable 2FA on all accountsBlock credential theft
Use password managerUnique passwords everywhere
Regular backupsRansomware recovery
Keep software updatedClose vulnerabilities
Security awarenessRecognize threats

Building Your Response Plan

Essential Information to Have Ready

InformationWhere to Store
Account list with recovery infoPassword manager
Bank/card contact numbersPhone contacts
Insurance policy numbersSecure document
Device serial numbersSecure document
Backup codesPassword manager
Trusted contactsMemorized or secure storage

Emergency Contacts

TypeNumber/Contact
Primary bankCard hotline number
Credit bureausListed above
Identity theftidentitytheft.gov
FBI IC3ic3.gov
Local policeNon-emergency line

Key Takeaways

  1. Stay calm - Panic leads to mistakes
  2. Contain first - Stop the bleeding before investigating
  3. Document everything - Screenshots, times, actions taken
  4. Know your contacts - Bank numbers, police, reporting sites
  5. Act quickly - Speed limits damage for many incidents
  6. Change passwords from clean devices - Don't use compromised systems
  7. Enable 2FA after incidents - Prevent recurrence
  8. Freeze credit proactively - Best identity theft protection
  9. Report incidents - Helps you and helps others
  10. Learn and improve - Every incident is a lesson