Thus far, this book has largely discussed identifying and detecting phishing messages and suspicious activity deriving from email messages impacting a computer or network. Once you identify this behavior, what should you do next? You learned the PICERL process and are nearing the final stages of our incident response process. These stages include eradication, remediation, and lessons learned. When complete, this closes out our process and brings our systems back to a normal state while analyzing what you’ve learned. ...
8. Remediation and Lessons Learned
Get How to Catch a Phish: A Practical Guide to Detecting Phishing Emails now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.