Digital Security Incident Runbook
Appearance
Digital Security Incident procedures for handling account compromises, device theft, or system access loss while maintaining operational security.
Immediate Response (First 15 minutes)
Step 1: Isolate and Assess
- Disconnect all compromised devices from internet immediately
- Activate airplane mode on mobile devices
- Do not attempt to "fix" compromised accounts from potentially infected devices
- Use clean device or secure location to access accounts
Step 2: Rapid Account Securing
Priority Order:
- Primary email account password reset
- Banking and financial accounts security check
- Social media and communication platform lockdown
- Cloud storage and backup service access verification
- Work-related accounts and systems security review
Step 3: Communication Lockdown
- Change passwords on all critical communication channels
- Enable two-factor authentication on newly secured accounts
- Log out all devices/sessions on compromised accounts
- Activate backup communication methods with trusted contacts
Recovery Procedures
Account Restoration
- Use pre-configured recovery email or phone numbers
- Employ offline authentication methods when available
- Contact platform support with identity verification if needed
- Document which accounts were compromised vs. still secure
Alternative Access Methods
- Activate secondary devices with clean OS installation
- Use public computer with secure boot media if necessary
- Employ backup authentication devices (hardware keys, etc.)
- Access accounts through trusted contacts if account sharing exists
Data Protection
- Remote wipe compromised devices using cloud management tools
- Change encryption keys on sensitive file storage
- Audit recent account activity for unauthorized access
- Secure offline backup access for critical data recovery
Source and Contact Protection
If Sources May Be Compromised
- Use secure communication methods to warn sources immediately
- Employ pre-arranged emergency contact protocols
- Switch to backup communication channels established in advance
- Document timeline of compromise to assess potential source exposure
Professional Communication
- Notify editors/clients of potential story timeline impacts
- Use alternative communication methods to maintain work flow
- Activate backup publishing platforms if primary access is compromised
- Implement backup byline/attribution methods if identity verification is affected
System Restoration
Clean Device Setup
- Restore systems from known-good backups created before compromise
- Use clean OS installation on recovered or replacement devices
- Implement enhanced security measures during restoration
- Verify all software and accounts before returning to full operation
Security Enhancement
- Enable additional authentication factors on all restored accounts
- Implement new password management with longer, unique passwords
- Configure enhanced monitoring and alerting for future incidents
- Review and update security protocols based on compromise method
Prevention and Preparation
Pre-Incident Security
- Regular backup of authentication codes and recovery keys
- Maintain offline copies of critical account recovery information
- Test alternative access methods quarterly
- Keep clean backup devices updated and accessible
Communication Planning
- Establish backup communication methods with all critical contacts
- Create encrypted contact lists stored in multiple secure locations
- Develop code words or verification methods for emergency communications
- Maintain relationships with technical support contacts at critical platforms
Follow-Up Security Review
Incident Analysis
- Document attack vector and timeline of compromise
- Identify security gaps that enabled the incident
- Review effectiveness of response procedures
- Update security protocols based on lessons learned
Ongoing Monitoring
- Monitor restored accounts for unusual activity
- Set up enhanced alerting for suspicious login attempts
- Review account activity logs regularly for first 30 days
- Maintain elevated security posture until confident in system integrity