UNIVERSITY OF WISCONSIN River Falls
October, 20, 2021
The National Institute of Standards and Technologies (NIST) has a standard for responding to any incident. It consists of five steps: preparation, detection and analysis, containment, eradication and recovery, and post incident activity. This is the basis for the UW-System Incident Response Policy. While this works for large systems, I find it easier to simplify this for personal use. There are two things to consider, planning and action. Today, I’ll focus on planning.
Here are a few things to consider as you build a personal plan:
It is also a good idea to test your plan. One common technique used my security professionals is a tabletop exercise. This can be as simple as sitting down with your close family and talking through what you would do in the case of an incident. What would you do if you ran over your cell phone, had your wallet stolen, had your Google account hacked, noticed fraudulent activity on your bank statement, lost your home due to a natural disaster? Will you have the information you need available?
As we move more of our lives online, these are important things to consider.