Content-Length: 42054 | pFad | http://www.ic3.gov/CrimeInfo/DataBreach

S Data Breach - Internet Crime Complaint Center (IC3) Skip to content

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Data Breach

What is a Data Breach?

A data breach is an intrusion into an organization’s system, network, or database, by an outside or internal entity, resulting in unauthorized access to confidential or secured information.

Tips to prepare for a data breach

  • Implement multifactor authentication for access to the operational technology (OT) network whenever applicable.
  • If you require remote access, implement a firewall and/or virtual private network (VPN) in front of the PLC to control network access. A VPN or gateway device can enable multifactor authentication for remote access even if the PLC does not support multifactor authentication.
  • Create strong backups of the logic and configurations to enable fast recovery.
  • Keep your systems updated with the latest versions by the manufacturer.

What to do in case of a data breach

  1. Contain the Problem

    Quarantine or take offline potentially affected hosts.

  2. Reimage Compromised Hosts

    Unless you are instructed to forensically preserve compromised systems, they should be reimaged as soon as possible to prevent attackers from using them as part of a botnet or a foothold into your network.

  3. Reset or Revoke Compromised Credentials

    Reset all credentials that may have been exposed during the intrusion, including user and service accounts, compromised certificates, or other "secret" credentials.

  4. File a Complaint

    File a detailed complaint with www.ic3.gov. The complaint should contain all required data in provided fields. Be sure to use the key words "data breach" in the incident description.

  5. Stay Informed

    Visit www.ic3.gov for updated Industry Alerts regarding data breaches as well as other cyber-enabled schemes.

Terms and Conditions

Prior to filing a complaint with the IC3, please read the following information regarding terms and conditions.

Should you have additional questions prior to filing your complaint, view FAQ for more information on inquiries such as:

  • What details will I be asked to include in my complaint?
  • What happens after I file a complaint?
  • How are complaints resolved?
  • Should I retain evidence related to my complaint?

Complaints filed via this website are analyzed and may be referred to federal, state, local or international law enforcement and partner agencies for possible investigation.

The complaint information you submit to this site is encrypted via secure socket layer (SSL) encryption. Please see the Privacy Policy for further information.

We thank you for your cooperation.


By clicking "I Accept" you acknowledge the following:

I understand any contact or investigation regarding any complaint I file on this website is initiated at the discretion of the agency receiving the complaint information. I will not be contacted by the IC3.

The information I'm providing on this form is correct to the best of my knowledge. I understand that providing false information could make me subject to fine, imprisonment, or both. (TITLE 18, U.S. CODE, SECTION 1001)









ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://www.ic3.gov/CrimeInfo/DataBreach

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy