Introducing PIRF!

Introducing the Personal Incident Response Framework (PIRF). It’s a free public knowledge base for contending with personal cybersecurity incidents — from “I lost my wallet” to “Grandma clicked a weird link.” Use it yourself, or point your friends and family to this link when they need step-by-setup instructions.

1–2 minutes

Hacked? Here’s What to Do.

Cyber and Law is launching the Personal Incident Response Framework (PIRF). It’s a free public knowledge base for contending with personal cybersecurity incidents — from “I lost my wallet” to “Grandma clicked a weird link.” Use it yourself, or point your friends and family to this link when they need step-by-setup instructions.

The advice contained herein borrows from current enterprise incident response techniques and simplifies them for everyday users. To use the playbook, you can visit the following link, pirf.cyberandlaw.com.

Infamous in my family, my grandfather asks me to write down a step-by-step guide of how to resolve a problem. Think of this playbook as a well-organized compilation of tips from the cybersecurity experts at Cyber and Law in an approachable format regardless of technical skill level.

The inspiration for this project stems from lessons learned in industry to unofficial ad hoc guides we’ve developed for our family and friends after they experience a breach or when they ask for cybersecurity related help. We hope this can serve as a resource for you, your friends and family, and your organization.

Using PIRF

PIRF includes 3 primary sections which mirror traditional incident response:

  1. Prevention: “don’t get hacked.”
  2. Detection: “did you get hacked?”
  3. Remediation: “So…you got hacked.”

Each page in PIRF is designed to be standalone. This is functional: each page will have enough information to resolve an issue without needing to know anything about PIRF.

Incidents Covered

This is the 2022 internet crime report. It details major internet crimes and statistics for 2022. This is the starting point for PIRF. Among the incidents listed are:

  1. Phishing
  2. Identity Theft
  3. Email Hacking
  4. Gift Card Scams
  5. Ransomware
  6. Social Engineering
  7. Call Center Fraud
  8. More to come…

We are constantly adding new incidents and attacks to the playbook. If there is an incident type that’s missing or that you would like to see, feel free to email feedback@cyberandlaw.com and let us know!

Leave a comment

Trending