Checklist B

Resources to Create in Advance

The following sections outline a general checklist for resources to have available before a cyber extortion crisis, so that you can make informed decisions and implement an effective response. These include plans, procedures, contact information, templates, technology, credentials, and reference materials.

Full response programs are ideal, but if you have not had time to create these, start with the items listed in the checklist that follows. These are simply general guidelines; modify and adapt them to suit your environment.

Note that you will almost certainly need to call in outside help during your recovery process. Make sure to have documentation for key activities that outside parties can follow, ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.