Resource Article
Resources / Incident Readiness
When email or phone roots are compromised, speed matters. A panic sheet keeps first actions clear when judgment is impaired by stress.
Include:
- Immediate containment actions by system (email, carrier, banking).
- Recovery priorities and account dependency order.
- Escalation contacts (provider abuse teams, counsel, key vendors).
- Evidence capture checklist for later legal and remediation work.
Run a short tabletop test so the plan is usable before a real event.