Want to create interactive content? It’s easy in Genially!
Incident Response Guide for End Users.pptx
scott_durham
Created on March 18, 2025
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Incident Response Guide for End Users
Be Vigilant
- Look out for unusual activity such as unexpected emails, system alerts, or unauthorized access to files.
- Notify your organization's IT or security team immediately if you suspect an incident.
- Use designated channels for incident reporting like a help desk portal or specific email address for incident reporting.
- Include key information like date, time, and description of the issue
- Attach any relevant screenshots
Recognize and Report
Disconnect
- If you suspect malware, immediately disconnect your device from the network to prevent the spread.
- Do not open, forward, or respond to suspicious emails or links.
- Log out of compromised accounts.
- Do not attempt to access compromised accounts without guidance from appropriate IT resources.
Contain the Incident
Work with IT
- Cooperate fully with the IT or Security Team.
- Follow IT or Security Team guidance carefully.
- Be ready to share additional details or context about what you observed.
- Do not try to fix the issue yourself unless directed as it may complicate the investigation.
Follow Instructions
Monitor Communication
- Watch for updates and instructions from the IT team about containment, resolution, and next steps.
- If passwords need to be reset or security patches need to be installed, do so immediately.
Stay Updated
Reflect
- Understand the cause of the incident and ways to avoid similar issues in the future.
- Participate in cybersecurity training and familiarize yourself with company policies regarding security best practices.
Learn and Prevent
Hover over each icon below to see examples before navigating to the next slide.
Examples of Incidents to Report
Key Indicators of a Security Incident
Login Attempts
- From unfamiliar locations
- From unfamiliar devices
- Changes you didn't initiate
- Alerts about unauthorized access to your account
Unusual Account Activity
Emails from Unknown Senders
- Requesting sensitive information
- Mismatched sender details
- Seem out of place
Phishing or Suspicious Emails
Pop-up Messages or Error Screens
- Appear without reason
- Could indicate malware
Unexpected System Behavior
Missing or Altered Files
- Files you didn’t modify
- Sensitive data being shared or downloaded without permission
- Receiving notifications related to breaches of your accounts
Data Anomalies
- Loss of Device
- Access to sensitive information
- Examples: laptop, phone
- Device Tampering
- Discovery of unauthorized access
Device Loss or Theft
Click on each illustration to complete the activity before navigating to the next slide.
Actions to Take When You Suspect an Incident
By staying alert to these signs, you can catch potential incidents early and minimize risks. You have completed this lesson and may now continue with training course.
Conclusion