Incident Response Checklist


Summary

This checklist provides guidance on the steps an organization should take after experiencing a data security incident. Every day, numerous organizations experience these incidents of varying scope and complexity. Sometimes the incident can be as straightforward as inadvertently sending an email to the wrong individual. Other times, the incident can be more complicated where workstations are encrypted, and business is shutdown. No matter the complexity of the data security incident your organization experiences (or suspects it has), there are certain steps you should take immediately.