Has your business been the victim of a PHISHING ATTACK, or are you getting a bunch of SMAP email?

Exclusive FREE Checklist:

If you recently were impacted by a Phishing Attach at your business, this is the recovery checklist you MUST have.

This checklist will outline the easy steps you should take to quickly recover from a Phishing Attack. If you just recovered from a Phishing or Spam blunder, this checklist will help you prevent it from happening again. Lets face it being hacked is a painful experience, this checklist will save you the pain of wondering what to do.

PHISHING RESPONSE CHECKLIST

DO THIS FIRST

  • Call the insurance company that holds your cyber security insurance. They will guide you on their requirements. Their requirements take precedence. Certain steps may need to be taken to protect forensic data. You never want to place yourself between your customer and their ability to collect an insurance claim.
  • Check the affected business’s Business Continuity/Disaster/Cyber Recovery Plan for the business. There may be specific requirements mandated by policy or the business owners.
  • If possible acknowledge, either in writing or via email, that the infection on occurred prior to your arrival onsite and that you were not the cause of this infection.
  • Notify all employees so that they can be vigilant as normally a phishing attack is sent to en entire organization.
  • Remember to communicate or reiterate the company’s rules of disclosure to your employees addressing what should or should not be communicated on social media, to the press, and to clients. Typical recommendation is that nothing is permitted to be disclosed un l such time as the company releases a statement (after all the facts of the event have been gathered and analyzed).
  • Gather an original copy of the email (DO NOT DELETE IT), it is often needed for forensics as it holds information about the actual sender.

CONTAINMENT

  • Run an external penetration test from the internet to look for anything unusual (ports) that shouldn’t be open in the firewall. If you don’t know how to do this or don’t have access to those tools, please send ALL public IP addresses to Creative IT as we may be able to check for you.
  • Verify your spam filter is up to date, or install one if one is not present. Block he address or domain that the emails are being sent from.
  • Check all security and system logs for any unusual activity. If you are working with Creative IT, let us know if the logs have been deleted from any devices.

● ● ●

 
Phishing Recovery Checklist

Downlod the full Checklist and you’ll Discover:

  1. The BEST Containment steps to make sure your risk does not grow from the phishing attack
  2. How to remediate the attack and get your business back up and running
  3. How to best recover from the attack
  4. 16 Ways to prevent cyber events in the future
  5. A FREE offer to help protect your company data

Get Your Free Checklist Now by Completing the Form

Or Call Us Direct: Current Clients: (336) 310-0277

Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.

Fill Out This Form
To Receive YourFREE Checklist

Questions? Call us 336-310-0277

Important! We hate spam as much (or more!) than you and promise to NEVER rent, share, or abuse your e-mail address and contact information in any way.

Creative IT Stays Well Informed Of Trends In The IT industry And Are Proactive With Security

Creative IT Stays Well Informed Of Trends In The IT industry And Are Proactive With Security
Prior to signing on with Creative IT our we had a security incident which basically rendered us inoperable for three days.  With the additional security measures and firewalls Creative IT have put in place I don’t believe we would be vulnerable to such an attack again. Creative IT has proactively ...Read More

Christine Mayers
Mary Reynolds Babcock Foundation