Ready For Unsteady

1

Cyberattack

Cyberattacks can hit anyone, from individuals facing identity theft to large-scale attacks on financial systems and critical infrastructure. Whether you’re personally hacked or affected by a widespread cyber incident, knowing how to prepare and respond can protect your data, finances, and household.

How to Prevent Cyberattacks

  • Backup Data: Regularly back up important data and keep backups in a secure location, both physically and digitally.
  • Strong Passwords: Use strong, unique passwords for all online accounts especially those that deal with money and consider using a password manager
  • Be Vigilant: Watch out for phishing emails, unsolicited calls, and suspicious websites.
  • Software Updates: Keep your software and operating systems up-to-date with the latest security patches.
  • Two-Factor Authentication: Enable two-factor authentication whenever possible to add an extra layer of security.
  • Secure Your Devices: Use firewalls, encryption, and screen locks; avoid public Wi-Fi for sensitive transactions.
  • Sufficient Savings: Aim to have at least three to six months’ worth of living expenses saved in an emergency fund. This will provide a financial cushion if your income is disrupted. 
  • Physical Emergency Fund: Maintain a physical cash emergency fund to cover expenses in case of a disruption.
  • Spread Out Risk: Don’t put all your eggs in one basket. Diversify your investments across different asset classes (stocks, bonds, cash) and sectors to reduce the impact of a single event. 
  • Know Your Bank’s Procedures: Understand your bank’s procedures for dealing with cyberattacks and have their contact information readily available.
  • Monitor Accounts: Regularly monitor your bank and credit card accounts for unusual activity. 
  • Protect Your Identity: Consider using a credit monitoring service to track your credit report and be alerted to potential fraud. 
  • Review Coverage: Review your homeowners, renters, and auto insurance policies to ensure they provide adequate coverage for cyber-related losses.
  • Identity Theft Insurance: Consider purchasing identity theft insurance to help cover the costs associated with recovering from a data breach.

What to Do If You Experience a Cyberattack

Act Immediately: Time is critical; every minute counts.

  • Identify the Type of Attack:
    • Device-Based Attack (e.g., malware, ransomware, suspicious activity on your computer):
      • Disconnect from the internet immediately to prevent further data exfiltration.
      • Avoid logging into sensitive accounts from the compromised device until it’s cleaned.
  • Account-Based Attack (ex. banking, email, or shopping accounts):
  • Check the nature of the compromise:
    • Password breach: Look for unusual login notifications or “password reset” emails. Change your password immediately using a secure device.
    • Card or Bank Account number compromise: Look for unauthorized transactions. Contact your bank or credit card issuer immediately to block or freeze the account.
    • Do not disconnect your device unless you suspect it is also infected—staying connected helps you act faster for account recovery.

Once you’ve identified the attack type, move fast to secure all critical accounts starting with those most likely to be exploited.

  • Change passwords starting with email, then banking, then other essential services.
  • Use a trusted device for these changes—if you suspect your device or network has also been compromised, change passwords from a secure device on a different network.
  • Enable two-factor authentication (2FA) for extra security.
  • Call your bank and credit card providers immediately.
  • Freeze cards or block accounts as recommended.
  • Request fraud alerts or credit freezes with credit bureaus.
  • Check recent transactions and set up notifications for new charges.
  • Ask About Recovery Assistance – many banks and credit card companies offer zero-liability protection and identity theft recovery support. Document all conversations (names, times, case numbers) for your records.

File official reports with:

  • FTC (U.S.): identitytheft.gov to file an official identity theft report and get a personalized recovery plan.
  • IC3 (FBI Internet Crime Complaint Center): ic3.gov to report phishing, ransomware, and financial fraud
  • Local law enforcement if identity theft or fraud is involved. Many banks require a case number for asset recovery.

Document Everything! Keep a detailed log including:

  • Dates and times of suspicious activity.
  • Screenshots or photos of fraudulent transactions or messages.
  • Case numbers from law enforcement and financial institutions.
  • Contact names and reference numbers from every call or email.
  • Store screenshots of emails, texts, or pop-up messages linked to the attack.
  • Back up all logs and screenshots in a secure location (ex. encrypted cloud or offline storage).

  • Use a credit monitoring service or pull free credit reports (U.S.: annualcreditreport.com).
  • Enable account alerts for any new logins or credit applications.
  • Regularly check bank, credit card, and investment accounts for activity.
  • Unexpected loan offers or collection calls.
  • Mail or email addressed to you for accounts you never opened.
  • Denied credit applications you didn’t initiate.
  • Watch for unfamiliar medical bills or insurance claims.
  • Keep an eye out for IRS notifications for tax filings you didn’t submit.

If the Attack Targets Critical Infrastructure

A cyberattack on critical infrastructure can affect more than utilities. Depending on the event, expect ripple effects on communication, healthcare, and even transportation.

Monitor alerts from:

  • CISA (U.S.): cisa.gov
  • Local emergency management agencies
  • Your utility providers’ official websites or apps
  • Avoid relying solely on social media rumors, verify updates through official government or service-provider channels.
  • Power: Have backup power options (flashlights, batteries, portable chargers, or generators if possible). Charge devices early if you hear of potential cyber incidents affecting utilities.
  • Water: Store at least 1 gallon per person per day for 3 days in case water treatment systems are impacted.
  • Medical: Keep a paper copy of medical info and prescriptions; have a backup plan if electronic systems go offline.
  • Keep some cash on hand in case payment networks go down.
  • Download digital statements or account details to access balances offline.
  • Avoid initiating large transactions during ongoing outages or cyber incidents.
  • Alternative Communication
    • Have a backup plan for staying in touch with family if cellular or internet service goes down.
    • Keep a written list of emergency contacts (friends, family, doctors, schools).
    • Invest in battery-powered or crank emergency radios for receiving official alerts.
  • Backup Security Measures
    • If your alarm system is internet-based, confirm it has cellular backup or offline mode.
    • For security cameras, choose models with local storage (SD card) so you can still access recordings without the cloud.
    • Install motion-sensor lights powered by batteries or solar to maintain security during power loss.
  • Maintain Climate Control Safeguards
    • Extreme Cold: Insulate pipes to prevent freezing, keep extra blankets, and consider a safe backup heating source like a propane heater (with ventilation).
    • Extreme Heat: Close blinds, insulate windows, and have battery-powered fans or access to cooler areas