IT and Security teams
Operationalize prevention, detection, containment, recovery, and after-action review at scale.
Educational summary — not live-incident instructions
The items below paraphrase publicly available guidance from sources such as CISA, NIST, and the FBI for use in advance reading and planning. They are not professional advice and not a substitute for your institution’s policies or trained responders. If an incident is happening right now, contact your campus IT or information-security team and, in the U.S., consider reporting to CISA and the FBI IC3.
Before Prepare
- Enforce phishing-resistant MFA (FIDO2/WebAuthn) on privileged accounts; require MFA campus-wide.
- Maintain offline, immutable, and tested backups for tier-1 systems. Test restoration on a defined cadence.
- Segment networks: separate research, administrative, student, IoT/lab, and clinical environments.
- Disable or strictly gate Remote Desktop Protocol (RDP) and legacy VPNs; require MFA and conditional access.
- Inventory assets and software dependencies, including third-party SaaS. Track exposure to known CVEs.
- Run continuous endpoint detection and response (EDR) with tested response playbooks for common ransomware behaviors.
- Hunt regularly for indicators of compromise in identity providers (impossible travel, MFA fatigue, OAuth grants, mailbox rules).
- Practice a tabletop exercise at least annually with leadership and communications.
- Pre-arrange incident-response retainers, legal counsel, cyber-insurance contacts, and FBI/CISA points of contact.
During Respond
- Trigger the incident-response plan; appoint an Incident Commander and stand up a war room (in-person or out-of-band channel).
- Contain: isolate affected segments, disable compromised identities, revoke active sessions and refresh tokens.
- Preserve evidence: capture memory and disk images before reimaging where feasible.
- Stop further encryption: block known C2, disable risky outbound traffic, kill malicious processes via EDR.
- Engage law enforcement (FBI/CISA in the U.S.) and any cyber-insurance hotline early; do not pay a ransom without legal/exec coordination.
- Coordinate with communications and legal on internal and external messaging cadence.
- Track everything in an incident timeline — decisions, actors, timestamps. This is essential for after-action and notifications.
- Plan recovery in priority order using your business-impact analysis; do not restore unhardened systems back into a still-compromised environment.
After Recover & learn
- Validate eradication: hunt for persistence, scheduled tasks, rogue accounts, mailbox rules, and OAuth apps.
- Rebuild affected systems from known-good images; rotate secrets, certificates, and service-account credentials.
- Run a structured after-action review (AAR) with a blameless postmortem; produce a written report and tracked actions.
- Update detections, runbooks, and the playbook based on observed TTPs.
- Brief leadership and the board with what changed, what we still need to fix, and what we will measure next.
Self-audit checklist
Your progress is saved on this device only.
IT & Security readiness checklist Complete
0 of 9 complete
What should I do right now?
A short decision tree for the most common situations in this role.
Practice scenario
Quick scenarios to turn this guidance into reflexes.