Experienced a fraud / cyber incident. What should I do now?

Experienced a fraud or cyber incident and not sure who to contact?
​
Use the UK Government reporting service to find out where to report a fraud / cyber incident.​

Need help following a cyber incident response plan?
Download this step-by-step guide to help you take action fast to resolve an incident.

Has data been encrypted preventing access?
✔ It's called ransomware and once malicious software has been released into your device.
✔ Without backups, or security software recovery is difficult.
✔ ​​​You may be able to regain access to encrypted files without having to pay with No more ransom.
✔ It's a law enforcement tool, full of keys that can decrypt data locked by different types of ransomware.

Operations disrupted?
Cyber attacks like denial of service, malware, ransomware, unauthorised system changes, or phishing attacks, can disrupt an organisation.

Locked out of email or social media accounts?
Use this recovery guide to minimise the damage and regain control of a hacked account.

Think you are involved in a Data Breach?
Follow these data breach actions to minimise the damage and reduce the risk of identity theft.

Need help resolving a cyber incident?
Download this response and recovery guide which provides organisations with guidance to recover from a cyber incident.

Need personal assistance?
Get in touch, we have Cyber Essentials partners that can also provide suitable assistance.

I want to protect my business
from online threats


Get Cyber Security resources
Join the CRC and receive an information pack of resources to keep you safer online.​

​Complete basic self-tests
✔ Use this free UK government service to check your cyber security.
✔ It scans for common vulnerabilities in your IT just like criminals do to find easy targets.

Assess your Cyber Risk
✔ Work through this plan to receive a personalised report on those security gaps.
✔ See what you can do right now to protect against a cyber attack.

Worried about attackers finding weaknesses in your IT system?
✔ A vulnerability assessment highlights where your system is exposed.
✔ See what can be exploited before they do.

Have a workforce and want to ensure they can only access data or areas of IT needed to undertake their roles and business objectives, and not stray into areas or access data they are not entitled to?
Consider an internal vulnerability assessment, this can highlight the area an insider would often exploit for their own benefit or gain, causing you disruption and damage.

Your workforce is your first and last line of defence when it comes to a cyber attack, do you know how they will react?
✔ Educational training helps staff spot and stop an attack.
✔ Acting fast reduces the damage and impact ​of an attack.​

Want an affordable cyber security framework?
Cyber essentials is perfect for small businesses.​
✔ Reassure customers you're serious about security
✔ Attract new business with verified protection
✔ Get a clear picture of your cyber security level
✔ Win government contracts—some require Cyber Essentials

How can I improve my supply chain?

Encourage your supply chain to adopt your same standard?
​✔ Reduce risk across your network – A few simple steps can protect the businesses you rely on.
✔ Strengthen your suppliers’ security – Encourage them to join this cyber security program and lower the risk to your operations.
​
Cyber threats don’t stop at your doorstep—make security a shared priority!