CExperiencing a cyber attack can be overwhelming. Swift and effective action is crucial to
minimize damage and restore normal operations. This checklist provides step-by-step
guidance—with explanations—to help your organization respond appropriately during a cyber
incident.
If you need immediate assistance or have questions, please contact our cybersecurity hotline 1 (855) 550 6628 or email help@moatit.com. Our experts are available to help at no charge
Early detection allows for a quicker and more effective response
Monitor for unusual system behavior, alerts, or notifications
Verify alerts from intrusion detection systems or antivirus software.
Cross-check with IT and security teams to confirm the attack.
Consult with cybersecurity experts if needed.
Having a predefined plan ensures an organized and efficient response.
Declare an incident as per your organization's protocols.
Follow the predefined steps in your incident response plan.
Inform the incident response team members immediately.
Contact senior management and relevant department heads.
Save 1 (855) 550 6628 and help@moatit.com for immediate expert assistance
Limiting the attack’s spread minimizes damage to your systems and data.
Disconnect compromised systems from the network.
Disable remote access temporarily if necessary.
Deactivate accounts that have been or may be compromised.
Apply firewall rules or intrusion prevention measures.
Increase monitoring of network traffic and logs.
Understanding the scope helps in making informed decisions on next steps.
Identify which systems and data have been affected.
Evaluate the potential impact on operations and data integrity
Record all known details about the attack.
Maintain an incident log of all actions taken.
Effective communication ensures that stakeholders are informed and coordinated.
Update employees on the situation as appropriate.
Provide instructions to staff, such as avoiding email or network use if needed.
Inform partners, suppliers, and clients if they may be affected
Follow legal and regulatory requirements for breach notifications.
Draft press releases or public announcements if necessary
Coordinate with public relations and legal teams.
Professional assistance can enhance your response and recovery efforts.
Reach out to 1 (855) 550 6628 or help@moatit.com for immediate support.
Involve legal experts to understand liabilities and obligations.
Engage external cybersecurity firms if needed.
Proper evidence handling is crucial for investigation and potential legal action.
Preserve logs, system images, and affected files.
Ensure evidence is stored securely and access is controlled.
Do not reboot, access, or modify compromised systems unnecessarily.
Keep detailed notes on all actions and observations.
Taking immediate corrective actions can prevent further damage.
Patch known vulnerabilities exploited in the attack.
Update antivirus and intrusion detection systems.
Change passwords and implement multi-factor authentication.
Increase network segmentation and access controls.
Increase surveillance of critical systems and data.
Set up real-time alerts for suspicious activities.
Ensuring essential operations continue minimizes the overall impact
Implement procedures to keep critical functions running.
Reallocate resources as necessary to support key operations.
Inform them of any service disruptions and expected resolution times.
Use alternative systems or processes to continue operations
Law enforcement agencies can provide support and may be required in certain cases.
Determine if the incident requires notification under laws or regulations
Assess whether law enforcement involvement could aid in the respons
Reach out to local or federal law enforcement as appropriate.
Provide necessary information without compromising sensitive data.
Understand notification timelines and procedures.
Submit initial incident reports as required.
Leverage any assistance or services offered by the insurer.
Planning ahead facilitates a smoother return to normal operations.
Decide whether to restore from backups or rebuild systems.
Verify that backups are clean and free of malware.
Validate the functionality and security of restored systems
Keep stakeholders informed about restoration timelines.
Comprehensive documentation supports future analysis and improvement.
Record all events, decisions, and actions chronologically.
Include findings, response measures, and outcomes.
Note areas for improvement in response and prevention.
Assess what worked well and what did not.
Update the incident response plan based on lessons learned.
Communicate changes to all relevant personnel.
You don’t have to navigate a cyber attack alone.
Contact 1 (855) 550 6628 or help@moatit.com for support.
Engage with cybersecurity communities or forums.
Provide resources to help staff cope with the incident.
Disclaimer: This checklist is a general guide and may not encompass all the specific needs of your organization. It is recommended to consult with cybersecurity professionals for personalized advice.