Eve's is an incident handler in ABC organization. One day, she got a complaint about email hacking incident from one of the employees of the organization. As a part of
incident handling and response process, she must follow many recovery steps in order to recover from incident impact to maintain business continuity.
What is the first step that she must do to secure employee account?
The first step in securing an employee's account following an email hacking incident involves restoring access to the email services if necessary and immediately changing the password to prevent unauthorized access. This action ensures that the attacker is locked out of the account as quickly as possible. While enabling two-factor authentication, scanning links and attachments, and disabling automatic file sharing are important security measures, they come into play after ensuring that the compromised account is first secured by changing its password to halt any ongoing unauthorized access. Reference: The ECIH v3 certification materials cover the initial steps to be taken when responding to incidents involving compromised accounts, emphasizing the importance of quickly changing passwords to secure the accounts against further unauthorized access.
Gerri
2 months agoBernardine
2 months agoMerri
24 days agoAhmed
26 days agoVallie
1 months agoJaime
1 months agoMarget
2 months agoCathrine
2 months agoVenita
2 months agoRozella
29 days agoTeddy
1 months agoViva
1 months agoJanna
2 months agoShawnee
1 months agoMagdalene
2 months agoAn
2 months agoShawnna
2 months agoPortia
2 months agoRima
2 months agoIra
3 months agoEdelmira
2 months agoSerina
2 months agoBo
2 months agoLucille
3 months agoDeandrea
3 months agoJordan
2 months agoTegan
2 months agoEladia
2 months agoBrittni
2 months agoVelda
3 months ago