WOULD YOU KNOW HOW TO DEAL WITH A CYBER ATTACK?

This entry is also available in:

In today’s TIP we challenge you to test the extent to which you would be able to cope with a “real” cyber-attack.

KEEP TRADITION SECURE is a totally free and secure simulation game that allows you to test your technical and cybersecurity knowledge by facing a simulated cyberattack, in this case at a university.

This simulator, owned by the TEXAS A&M UNIVERSITYcomes by default in English, but in each scenario the player has enough time to translate the questions.

Do you accept the challenge?

LINK TO THE GAME: https://keeptraditionsecure.tamu.edu/

RECOMMENDATION OF SECURE&IT:

Whether we suspect or are certain that we are suffering a cyber-attack, remember that it is essential to follow the following steps to avoid a major impact on the activity of our company:

User: Disconnect the network cable or WIFI connection of our device, to avoid further propagation even via VPN, and report it as soon as possible to the IT Department, so that they can assess the seriousness of the incident.

IT Department: Assess the extent of the attack. If it is a massive malware (virus/ransomware) cyber-attack, affecting more than one device or even server, ensure that the last backup has not been compromised and secure it by blocking the connection.

Responsible for security and senior management: Hiring or activating a Computer Security Incident Response Team (CSIRT), composed of cybersecurity experts that will allow us to analyze the incident, perform a forensic investigation of the incident, report it to the authorities and recover our business activity in the best technical and organizational conditions.

Data Protection Officer (DPO)In case personal data have been compromised, perform an impact assessment (PIA), document the implemented measures of containment, eradication and improvement, and formally communicate to the national data protection agency, which is competent as supervisory authority.