Checklist

Checklist for Public-Private Organizations: Actions During a Cyber Attack

CExperiencing a cyber attack can be overwhelming. Swift and effective action is crucial to
minimize damage and restore normal operations. This checklist provides step-by-step
guidance—with explanations—to help your organization respond appropriately during a cyber
incident.

If you need immediate assistance or have questions, please contact our cybersecurity hotline 1 (855) 550 6628 or email help@moatit.com. Our experts are available to help at no charge

01.Detect and Confirm the Cyber Attack

Early detection allows for a quicker and more effective response

Identify Indicators of Compromise

Monitor for unusual system behavior, alerts, or notifications

Verify alerts from intrusion detection systems or antivirus software.

Validate the Incident

Cross-check with IT and security teams to confirm the attack.

Consult with cybersecurity experts if needed.

02. Activate the Incident Response Plan

Having a predefined plan ensures an organized and efficient response.

Initiate the Plan

Declare an incident as per your organization's protocols.

Follow the predefined steps in your incident response plan.

Notify Key Personnel

Inform the incident response team members immediately.

Contact senior management and relevant department heads.

Keep Cybersecurity Hotline Information Handy

Save 1 (855) 550 6628 and help@moatit.com for immediate expert assistance

03. Contain the Attack

Limiting the attack’s spread minimizes damage to your systems and data.

Isolate Affected Systems

Disconnect compromised systems from the network.

Disable remote access temporarily if necessary.

Disable Compromised Accounts

Deactivate accounts that have been or may be compromised.

Implement Network Controls

Apply firewall rules or intrusion prevention measures.

Increase monitoring of network traffic and logs.

04. Assess the Impact

Understanding the scope helps in making informed decisions on next steps.

Determine the Extent of the Attack

Identify which systems and data have been affected.

Evaluate the potential impact on operations and data integrity

Document Findings

Record all known details about the attack.

Maintain an incident log of all actions taken.

05.Communicate Internally and Externally

Effective communication ensures that stakeholders are informed and coordinated.

Inform Internal Stakeholders

Update employees on the situation as appropriate.

Provide instructions to staff, such as avoiding email or network use if needed.

Notify External Parties

Inform partners, suppliers, and clients if they may be affected

Follow legal and regulatory requirements for breach notifications.

Prepare Public Statements

Draft press releases or public announcements if necessary

Coordinate with public relations and legal teams.

06. Engage Cybersecurity Experts

Professional assistance can enhance your response and recovery efforts.

Contact Cybersecurity Hotline

Reach out to 1 (855) 550 6628 or help@moatit.com for immediate support.

Consult with Legal Counsel

Involve legal experts to understand liabilities and obligations.

Consider Hiring Incident Response Specialists

Engage external cybersecurity firms if needed.

07. Collect and Preserve Evidence

Proper evidence handling is crucial for investigation and potential legal action.

Secure Relevant Data

Preserve logs, system images, and affected files.

Ensure evidence is stored securely and access is controlled.

Avoid Altering Affected Systems

Do not reboot, access, or modify compromised systems unnecessarily.

Document Everything

Keep detailed notes on all actions and observations.

08. Implement Mitigation Measures

Taking immediate corrective actions can prevent further damage.

Apply Security Patches and Updates

Patch known vulnerabilities exploited in the attack.

Update antivirus and intrusion detection systems.

Strengthen Security Controls

Change passwords and implement multi-factor authentication.

Increase network segmentation and access controls.

Monitor Systems Closely

Increase surveillance of critical systems and data.

Set up real-time alerts for suspicious activities.

09. Maintain Business Continuity

Ensuring essential operations continue minimizes the overall impact

Activate Business Continuity Plan

Implement procedures to keep critical functions running.

Reallocate resources as necessary to support key operations.

Communicate with Customers and Partners

Inform them of any service disruptions and expected resolution times.

Adjust Operations if Necessary

Use alternative systems or processes to continue operations

10. Consider Involving Law Enforcement

Law enforcement agencies can provide support and may be required in certain cases.

Evaluate the Need to Report

Determine if the incident requires notification under laws or regulations

Assess whether law enforcement involvement could aid in the respons

Contact Appropriate Authorities

Reach out to local or federal law enforcement as appropriate.

Provide necessary information without compromising sensitive data.

11. Notify Your Cybersecurity Insurance Provider

Timely notification is often required to utilize coverage benefits.

Review Policy Requirements

Understand notification timelines and procedures.

Provide Necessary Information

Submit initial incident reports as required.

Utilize Available Resources

Leverage any assistance or services offered by the insurer.

12. Prepare for Recovery

Planning ahead facilitates a smoother return to normal operations.

Plan System Restoration

Decide whether to restore from backups or rebuild systems.

Verify that backups are clean and free of malware.

Test Restored Systems

Validate the functionality and security of restored systems

Communicate Recovery Progress

Keep stakeholders informed about restoration timelines.

13. Document All Actions Taken

Comprehensive documentation supports future analysis and improvement.

Maintain an Incident Timeline

Record all events, decisions, and actions chronologically.

Compile a Detailed Report

Include findings, response measures, and outcomes.

Identify Lessons Learned

Note areas for improvement in response and prevention.

14. Update Incident Response and Security Policies

Continuous improvement enhances your organization’s cybersecurity posture.

Review the Effectiveness of the Response

Assess what worked well and what did not.

Revise Policies and Procedures

Update the incident response plan based on lessons learned.

Train Staff on Updated Protocols

Communicate changes to all relevant personnel.

15. Seek Support and Guidance

You don’t have to navigate a cyber attack alone.

Reach Out for Assistance

Contact 1 (855) 550 6628 or help@moatit.com for support.

Utilize External Resources

Engage with cybersecurity communities or forums.

Consider Employee Support Services

Provide resources to help staff cope with the incident.

Responding effectively during a cyber attack is critical to minimizing damage and facilitating a swift recovery. By following this checklist and utilizing available resources, your organization can navigate the incident with greater confidence and control. For immediate assistance or personalized guidance during a cyber attack, please contact our cybersecurity hotline at 1 (855) 550 6628 or email help@moatit.com. Our experts are ready to help at no charge.

Disclaimer: This checklist is a general guide and may not encompass all the specific needs of your organization. It is recommended to consult with cybersecurity professionals for personalized advice.