Step 1–Disconnect your computer from the network do not turn off
Step 2–Report the suspected incident to your supervisor
Step 3–The supervisor reports the suspected incident following Agency procedures to the Agency/Staff Office Information Systems Security Program Manager (ISSPM) or Office Computer Incident Response Team (CIRT).
Step 4–Agency/Staff Office ISSPM or CIRT notifies the ISC 24 Hour Hotline at 866-905-6890 or email@example.com.
Has Your System Been Breached?
Unfortunately, many different types of computer vulnerabilities are common in our technology-centered world. This means that breaches may show up in many different ways.
The most obvious sign of a breach is when a device no longer operates normally. Here are some signs for concern:
- Performance suddenly slows down
- Strange things pop up on the screen
- Familiar application functions no longer work properly
- Your browser homepage changes without intervention
- Clicking on Google-provided links sends you to random pages
- Your browser has trouble connecting to the Internet
The good news is that these symptoms aren’t always caused by a breach. But only an expert can tell, so you should report all such anomalies immediately.
Fighting Hidden Threats
Sophisticated, subtle threats can only be detected by experts or security technology:
- ISC may alert the Agency/Staff Office ISSPM or CIRT of a breach
- An intrusion detection device may identify an attack
- Anti-virus software may fire in response to malicious code
- A security scan may detect a vulnerability on a server that is critical to your mission.