Federal Ransomware Guides

Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA)

CISA’s CyberSentry – The program provides unique visibility into cyber threats targeting critical infrastructure entities that are highly targeted and highly consequential, enabling a true partnership between CISA and each participating organization to provide an added layer of detection and response using sensitive operational information.

Weak Security Controls and Practices Routinely Exploited for Initial Access – This page provides several recommendations and technical details that organizations can take to reduce their risk of becoming a victim to malicious cyber activity. (May 17, 2022)

Reducing the Significant Risk of Known Exploited Vulnerabilities: Organizations should review and refresh their vulnerability management policies, refer to the CISA catalog of known exploited vulnerabilities, and establish a more aggressive turnaround time to protect their networks against urgent, active threats. (Nov. 3, 2021)

Dark Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks (May 11, 2021)

Ransomware Guide providing recommended best practices for addressing ransomware attacks (September 2020)

More CISA Resources:

Stop Ransomware | CISA

(DROPBOX) Conti Ransomware | CISA, FBI, NSA

Cybersecurity Awareness Month – October | CISA

Cyber Resource Hub | CISA

(DROPBOX) Selecting and Hardening Remote Access VPN Solutions | CISA, NSA

Federal Bureau of Investigation (FBI)

Cyber Crime – The FBI’s cyber strategy is to impose risk and consequences on cyber adversaries. Learn more about what you can do to protect yourself from cyber criminals, how you can report cyber crime, and the Bureau’s efforts in combating the evolving cyber threat.

White House Memo

Department of the Treasury

Report a Cyber Incident

Report anomalous cyber activity and/or cyber incidents 24/7 to [email protected] or (888) 282-0870.

Report incidents as defined by NIST Special Publication 800-61 Rev 2, to include:

  • Attempts to gain unauthorized access to a system or its data,
  • Unwanted disruption or denial of service, or
  • Abuse or misuse of a system or data in violation of policy.

Federal incident notification guidelines, including definitions and reporting timeframes, can be found here.

Contact: [email protected]