Eve's is an incident handler in ABC organization. One day, she got a complaint about email hacking incident from one of the employees of the organization. As a part of
incident handling and response process, she must follow many recovery steps in order to recover from incident impact to maintain business continuity.
What is the first step that she must do to secure employee account?
The first step in securing an employee's account following an email hacking incident involves restoring access to the email services if necessary and immediately changing the password to prevent unauthorized access. This action ensures that the attacker is locked out of the account as quickly as possible. While enabling two-factor authentication, scanning links and attachments, and disabling automatic file sharing are important security measures, they come into play after ensuring that the compromised account is first secured by changing its password to halt any ongoing unauthorized access. Reference: The ECIH v3 certification materials cover the initial steps to be taken when responding to incidents involving compromised accounts, emphasizing the importance of quickly changing passwords to secure the accounts against further unauthorized access.
Gerri
19 days agoBernardine
21 days agoJaime
7 days agoMarget
23 days agoCathrine
26 days agoVenita
27 days agoTeddy
3 days agoViva
9 days agoJanna
29 days agoShawnee
8 days agoMagdalene
15 days agoAn
23 days agoShawnna
30 days agoPortia
1 months agoRima
1 months agoIra
2 months agoEdelmira
24 days agoSerina
29 days agoBo
29 days agoLucille
2 months agoDeandrea
2 months agoJordan
23 days agoTegan
27 days agoEladia
1 months agoBrittni
1 months agoVelda
2 months ago