Emergency Response Plan
Having an Emergency Response Plan in place is important to helping victims of a cyberattack?
Questions to ask yourself
- What are your threats and vulnerabilities?
- What is the likelihood of any given threat to occur?
- What are the consequences if those threats were to occur?
- What is your tolerance for the associated consequences?
- What is your attitude to or comfort level with security practices?
- How much time do you have for security?
Risk = Threat x Vulnerability x Consequences
Develop a Plan
Emergency Action Plan
Incident Management Plan
Short-term Recovery Plan
Long-term Recovery Plan
Conduct a Vulnerability Assessment
Cybersecurity
Online Safety Considerations
Protecting your Online Accounts, PC and Mobile
Building Readiness & Resilience
Determine Risk and Priority for Mitigation
Estimate the likelihood of a Risk to Occur
- High Need to Mitigate
- Medium Need to Mitigate
- Low Need to Mitigate
Safety & Security Protocols
- What are your security goals?
- Communication, transparency & responsiveness
- Information Sharing Process
- Online Security Training
- Document of Online Security Steps
Make a List of Reporting Steps just in case
Check how to report a cybersecurity incident
Check Public Awareness Campaigns
Culture of Cyber Readiness
Understanding Cyber Hygiene
CISA Cybersecurity Resources Roadmap
https://us-cert.cisa.gov/resources/smb
CISA Cyber Essentials
https://www.cisa.gov/publication/cisa-cyber-essentials
CISA National Cyber Awareness System (NCAS): Website Security
https://www.us-cert.gov/ncas/tips/ST18-006
CISA NCAS Using Caution with Email Attachments
https://www.us-cert.gov/ncas/tips/ST04-010
CISA Privacy and Mobile Device Apps
https://us-cert.cisa.gov/ncas/tips/st19-003
Online Safety
CISA Online Privacy Tip Sheet
https://www.cisa.gov/publication/stop-think-connect-toolkit
CISA NCAS: Staying Safe on Social Networking Sites
https://www.us-cert.gov/ncas/tips/ST06-003
CISA Social Media Cybersecurity Tip Sheet
https://www.cisa.gov/publication/stop-think-connect-toolkit
CISA NCAS: Guidelines for Publishing Information Online
https://www.us-cert.gov/ncas/tips/ST05-013
National Cybersecurity Alliance Social Media Cybersecurity Best Practices
https://staysafeonline.org/resource/social-media-cybersecurity-best-practices/
CISA NCAS: Dealing with Cyberbullies
https://www.us-cert.gov/ncas/tips/ST06-005
CISA NCAS: Avoiding Social Engineering and Phishing Attacks
https://www.us-cert.gov/ncas/tips/ST04-014
Security Practices and Awareness
CISA How to Recognize and Prevent Cybercrime Tip Card
https://www.cisa.gov/publication/stop-think-connect-toolkit
CISA Report Cyber Incidents
https://www.cisa.gov/reporting-cyber-incidents
https://us-cert.cisa.gov/report
CISA Sign-up for US-CERT Monthly Bulletin
https://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new
CISA Cyber Resilience Review (CRR)
https://www.us-cert.gov/resources/assessments
CISA Cybersecurity Advisors (CSAs)
https://www.cisa.gov/csa
CISA Insights: Remediate Vulnerabilities for Internet-Accessible Systems
https://www.cisa.gov/insights
CISA Cyber Tabletop Exercise Package (CTEP)
https://www.cisa.gov/national-cyber-exercise-and-planning-program
DHS Handbook for Safeguarding Personally Identifiable Information
https://www.dhs.gov/publication/handbook-safeguarding-sensitive-personally-identifiable-information
Malware and Viruses CISA Malware Tip Card
https://www.cisa.gov/publication/stop-think-connect-toolkit
Phishing Attacks CISA Phishing Tip Card
https://www.cisa.gov/publication/stop-think-connect-toolkit
Ransomware
CISA US-CERT Ransomware Resources
https://www.us-cert.gov/Ransomware
CISA NCAS: Protecting Against Ransomware Security Tips
https://www.us-cert.gov/ncas/tips/ST19-001
Website Defacement
CISA Cyber Insights: Mitigate DNS Infrastructure Tampering
https://www.cisa.gov/insights
CISA Cyber Insights: Remediate Vulnerabilities for Internet-Accessible Systems
https://www.cisa.gov/insights
Comments
0 comments
Please sign in to leave a comment.