Incident Response Guide
Cyber Incident Response Guide
Section titled “Cyber Incident Response Guide”What to do if you suspect your accounts, devices, or data have been compromised. Don’t panic—this guide will walk you through each step.
Prevention is the best option! See the Digital Force Protection Guide for preventive measures.
Quick Navigation
Section titled “Quick Navigation”- Identify - What happened?
- Secure - Stop the bleeding
- Restore - Recover from the incident
- Report - Notify appropriate parties
- Learn - Prevent future incidents
Identify the Problem
Section titled “Identify the Problem”Online Account Issues
Section titled “Online Account Issues”Signs:
- Locked out of your account
- Money missing from financial accounts
- Changes or activities you didn’t make
- Login notifications from unknown locations
- Password reset emails you didn’t request
Action: Secure Your Online Accounts
Device Behavior Issues
Section titled “Device Behavior Issues”Signs:
- Computer acting on its own (mouse moving, unexpected restarts)
- Ransomware message
- Fake antivirus or update messages
- New plugins, toolbars, or applications you didn’t install
- Device running slowly or behaving abnormally
- Unexpected pop-ups
- Searches being redirected
Action: Secure Your Local Devices
Data Leaks and Breaches
Section titled “Data Leaks and Breaches”Signs:
- Private information shared online without permission
- Personal images or media shared without consent
- Notifications from companies about breaches
- Your information appearing in data breach databases
Action:
- Alert family and friends to be cautious
- Freeze Your Credit
- Secure Your Online Accounts
Social Engineering and Scams
Section titled “Social Engineering and Scams”Phishing:
- Email or message asking for personal/financial information
- Do not respond or click links
- Mark as spam and delete
- Secure Your Network if you interacted
Financial Scams:
- Requests for money or banking information
- Pressure using fear or urgency
- Read about common scams
Lost or Stolen Device
Section titled “Lost or Stolen Device”Action:
- Secure Your Online Accounts immediately
- Try to locate using tracking service
- Consider remotely wiping the device
- Report to police if stolen
Secure Your Environment
Section titled “Secure Your Environment”Secure Your Online Accounts
Section titled “Secure Your Online Accounts”Immediate steps:
-
Change Passwords
- Update passwords for ALL important accounts
- Start with email (it’s the recovery for everything else)
- Use a password manager
-
Enable Multi-Factor Authentication (MFA)
- Use authenticator apps, not SMS
- Hardware keys are best
-
Check for Breaches
- Have I Been Pwned - Check if your email was compromised
-
Prioritize These Accounts:
- Email accounts (especially recovery emails)
- Financial accounts (banks, credit cards, crypto)
- Mobile carrier account (prevents SIM swapping)
- Social media (prevents impersonation)
-
Review Account Activity
- Check login history
- Review connected apps and devices
- Revoke unknown sessions
Secure Your Local Devices
Section titled “Secure Your Local Devices”-
Disconnect from Internet
- Unplug network cable or turn off Wi-Fi
- Prevents further unauthorized access
-
Run a Malware Scan
- Use reputable antivirus software
- Malwarebytes is recommended
-
Update Software
- Operating system
- All applications
-
Review Installed Programs
- Uninstall anything you don’t recognize
- Check browser extensions
-
Change Device Passwords
- Use strong, unique passwords
-
Consider Professional Help
- If unsure, seek assistance
Secure Your Network
Section titled “Secure Your Network”-
Change Router Passwords
- Admin password
- Wi-Fi password
-
Update Router Firmware
-
Disable Remote Management
-
Review Connected Devices
- Remove any unknown devices
-
Set Up Guest Network
- Isolate main devices from guests
Identity Protection
Section titled “Identity Protection”-
Freeze Your Credit
-
Review Financial Statements
- Look for unauthorized transactions
- Set up transaction alerts
-
Remove Personal Information
- From social media
- From data brokers (see Data Removal Guide)
Restore
Section titled “Restore”Account Recovery
Section titled “Account Recovery”- Reset passwords and security questions
- Use masked emails for sensitive accounts
- Set up fresh MFA tokens
Data Recovery
Section titled “Data Recovery”- Restore from backups if available
- Use data recovery software if needed
- Consult professionals for critical data
Severe Compromise
Section titled “Severe Compromise”In severe cases:
- Reinstall operating system to ensure all malware is removed
- Replace the device if hardware compromise is suspected
- Get new phone number if SIM swapped
Report
Section titled “Report”Who to Contact
Section titled “Who to Contact”Financial Institutions:
- Inform of unauthorized activity
- Request new cards if needed
- Set up fraud alerts
Law Enforcement:
- File a police report for identity theft or significant fraud
- Get a copy of the report for your records
Affected Parties:
- Let friends and family know if they might be impacted
- Warn them about potential impersonation
Official Reporting:
- FTC - For scams and fraud
- IC3 - FBI’s Internet Crime Complaint Center
- IdentityTheft.gov - Identity theft reporting
Review What Happened
Section titled “Review What Happened”- How did the incident occur?
- What was the entry point?
- What could have prevented it?
Implement Preventive Measures
Section titled “Implement Preventive Measures”- Strong, unique passwords everywhere
- MFA on all important accounts
- Regular backups
- Keep software updated
- Be cautious with emails and links
- Regular security checkups
Stay Updated
Section titled “Stay Updated”- Follow security news
- Learn about new threats
- Update your practices
Monitor Ongoing
Section titled “Monitor Ongoing”Regular Checks
Section titled “Regular Checks”- Monitor bank statements weekly
- Review account activity monthly
- Check credit reports quarterly
- Search for your information in breach databases
- Credit monitoring services
- Identity theft protection
- Have I Been Pwned notifications
- Network monitoring apps
For Activists Specifically
Section titled “For Activists Specifically”If You Suspect Targeting
Section titled “If You Suspect Targeting”- Document everything
- Reach out to digital security organizations
- Consider legal consultation
- Connect with other activists who’ve faced similar situations
Resources
Section titled “Resources”- EFF - Electronic Frontier Foundation
- Access Now Digital Security Helpline
- Freedom of the Press Foundation
Quick Reference Card
Section titled “Quick Reference Card”If compromised, do this NOW:
- ✅ Disconnect from internet (if device issue)
- ✅ Change email password from a DIFFERENT device
- ✅ Enable MFA on email
- ✅ Change passwords on financial accounts
- ✅ Freeze credit
- ✅ Run malware scan
- ✅ Document everything
- ✅ Alert close contacts if impersonation risk