In all seriousness, there are 6 steps for an incident such as a breach, these cover the before, during and after.
Based on the SANS PICERL model.
Preparation: You should be documenting your environment, discussing "what if" scenarios, get training and produce training for your management and users, create a box with notepads, contacts list, pens etc. for any issue you feel you may face. Basically become a doomsday sayer, prepare for the worst as one day it may active, be proactive. One excellent example of this is how will you communicate if you have been breached?
You can't now trust your phones or email. Get a couple of cheap pay as you go phones and be prepared to nip out and get some cheap sims, create some webmail accounts and write the passwords down, do not store them on any computer! Stick the username and...
↧
How to Avoid Becoming the Blamed Victim
↧