Select your incident type and get a step-by-step response checklist based on the NIST Incident Response framework. Interactive, actionable, and free.
Select your incident type to generate a tailored response checklist based on industry best practices and the NIST Incident Response framework.
Malware has encrypted files and is demanding payment for decryption.
Sensitive data has been accessed, exfiltrated, or exposed by an unauthorised party.
A user has fallen for a phishing attack or credentials have been stolen and used.
A current or former employee, contractor, or partner is misusing their access.
Distributed Denial of Service attack is overwhelming your systems or network.
A vendor, supplier, or third-party software/service has been compromised and is affecting your systems.