Eve's is an incident handler in ABC organization. One day, she got a complaint about email hacking incident from one of the employees of the organization. As a part of
incident handling and response process, she must follow many recovery steps in order to recover from incident impact to maintain business continuity.
What is the first step that she must do to secure employee account?
The first step in securing an employee's account following an email hacking incident involves restoring access to the email services if necessary and immediately changing the password to prevent unauthorized access. This action ensures that the attacker is locked out of the account as quickly as possible. While enabling two-factor authentication, scanning links and attachments, and disabling automatic file sharing are important security measures, they come into play after ensuring that the compromised account is first secured by changing its password to halt any ongoing unauthorized access. Reference: The ECIH v3 certification materials cover the initial steps to be taken when responding to incidents involving compromised accounts, emphasizing the importance of quickly changing passwords to secure the accounts against further unauthorized access.
Louvenia
3 months agoPearlene
3 months agoHelene
3 months agoDahlia
4 months agoRefugia
4 months agoLuther
4 months agoFloyd
4 months agoNoel
4 months agoSunny
5 months agoRosio
5 months agoFlorinda
5 months agoJoanne
5 months agoBobbye
5 months agoGerri
1 year agoBernardine
1 year agoMerri
1 year agoAhmed
1 year agoVallie
1 year agoJaime
1 year agoMarget
1 year agoCathrine
1 year agoVenita
1 year agoRozella
1 year agoTeddy
1 year agoViva
1 year agoJanna
1 year agoShawnee
1 year agoMagdalene
1 year agoAn
1 year agoShawnna
1 year agoPortia
1 year agoRima
1 year agoIra
1 year agoEdelmira
1 year agoSerina
1 year agoBo
1 year agoLucille
1 year agoDeandrea
1 year agoJordan
1 year agoTegan
1 year agoEladia
1 year agoBrittni
1 year agoVelda
1 year ago