In May 2021, Colonial Pipeline paid a $4.4 million ransom after a single compromised password shut down fuel distribution across the U.S. East Coast. The attack didn't just expose a vulnerability in critical infrastructure — it exposed a truth most organizations ignore: the speed and quality of your response determines whether a cyberattack is a contained incident or an existential crisis. Knowing how to respond to a cyberattack isn't optional anymore. It's the difference between a bad week and a business-ending disaster.
I've worked with organizations mid-breach who had zero documentation, no communication plan, and leadership asking "who do we call?" while data was actively being exfiltrated. This post gives you the exact steps to avoid being that organization. These aren't theoretical frameworks. These are the moves that actually matter when the alerts start firing.
Why Most Organizations Fail Their First Real Cyberattack
The 2021 Verizon Data Breach Investigations Report found that 85% of breaches involved a human element — phishing, credential theft, social engineering. That means most attacks exploit people, not just technology. And most people have never been told what to do when something goes wrong.
Here's what I've seen repeatedly: an employee clicks a malicious link, realizes something is off, and does nothing for hours. Sometimes days. They're afraid of getting in trouble. They don't know who to tell. The threat actor uses that silence to move laterally, escalate privileges, and establish persistence.
The IBM Cost of a Data Breach Report 2021 put the average breach cost at $4.24 million globally. But here's the number that should keep you up at night: organizations that contained a breach in under 200 days saved an average of $1.26 million compared to those that took longer. Speed kills — or saves — in incident response.
Step 1: Detect and Confirm the Incident
Before you can respond, you need to know something is actually happening. That sounds obvious, but the average time to identify a breach in 2021 was 212 days according to IBM. That's seven months of a threat actor living in your environment.
What Detection Actually Looks Like
Detection comes from multiple sources: endpoint detection tools, SIEM alerts, user reports, or even a tip from law enforcement. In my experience, some of the most critical early warnings come from employees who notice something unusual — a login they didn't initiate, a strange email in their sent folder, a file they didn't create.
This is exactly why cybersecurity awareness training for your entire workforce pays dividends during a crisis. Trained employees report faster. Untrained employees freeze.
Once you get an alert, confirm it's real. Not every anomaly is an attack. But treat every potential indicator seriously until you've ruled it out. Document the initial detection — who reported it, when, what they observed. This timeline becomes critical later.
Step 2: Activate Your Incident Response Team
If you don't have a designated incident response team, you're already behind. Your IRT should include representatives from IT/security, legal, communications, and executive leadership. Every person should know their role before an incident happens.
The First 30 Minutes Matter Most
Assemble the team immediately. Not in an hour. Not after lunch. Now. Assign a single incident commander who makes decisions and prevents the chaos of design-by-committee during a crisis.
Establish a secure communication channel. If your email is compromised, you can't coordinate response over email. Have a backup — an out-of-band messaging platform, a phone bridge, even a physical war room. I've seen organizations coordinate their entire response over a compromised Slack instance without realizing the attacker was reading every message.
Step 3: Contain the Threat
Containment is where you stop the bleeding. This isn't remediation — it's damage limitation. The goal is to prevent the threat actor from expanding their access while you figure out the full scope.
Short-Term Containment
- Isolate affected systems. Disconnect compromised machines from the network. Don't power them off — you may destroy forensic evidence in volatile memory.
- Disable compromised accounts. If credential theft is involved, reset passwords and revoke tokens immediately. Force re-authentication across the board if scope is unclear.
- Block known malicious IPs and domains. Update firewall rules and DNS filtering based on indicators of compromise (IOCs) you've identified.
- Implement network segmentation. If you haven't already, now is the time to isolate critical assets from potentially compromised network segments.
Long-Term Containment
Once the immediate spread is stopped, implement temporary fixes that let business operations continue while you work on full remediation. This might mean standing up clean systems, rerouting traffic, or enabling stricter access controls.
If ransomware is involved, this is where you assess backup integrity. Can you restore from backups that haven't been encrypted or corrupted? The FBI's Internet Crime Complaint Center (IC3) at ic3.gov consistently advises against paying ransoms, as payment doesn't guarantee data recovery and funds further criminal operations.
Step 4: Eradicate the Root Cause
Containment stops the spread. Eradication eliminates the threat. These are different steps, and skipping eradication is how organizations get hit twice by the same attacker.
Finding Every Foothold
Threat actors rarely have a single point of access. If they entered through a phishing email, they likely established backdoors, created new accounts, or planted web shells. You need to find all of them.
Conduct a thorough forensic investigation. Review logs, analyze malware samples, map lateral movement. If your team doesn't have this capability in-house, bring in a qualified incident response firm. This isn't the time for pride.
Common eradication steps include:
- Removing malware and backdoors from all affected systems
- Patching the vulnerability that allowed initial access
- Rebuilding compromised systems from known-clean images
- Enforcing multi-factor authentication across all accounts, especially privileged ones
- Rotating all credentials — not just the ones you know are compromised
Step 5: Recover and Restore Operations
Recovery is methodical, not rushed. Bringing systems back online before eradication is complete invites re-infection. I've seen it happen more times than I'd like to admit.
A Phased Recovery Approach
Prioritize systems by business criticality. Restore the most essential operations first, monitor them intensely, then expand. Every restored system should be verified clean and patched before reconnection.
Increase monitoring during recovery. Threat actors often test their access after an organization thinks the incident is over. Watch for anomalous logins, unexpected network traffic, and any callback to known command-and-control infrastructure.
This phase is also where you validate that your zero trust principles are actually in place. Verify least-privilege access. Confirm network segmentation. Ensure endpoint protection is updated and active across every device.
How to Respond to a Cyberattack: The Quick-Reference Checklist
If you're searching for how to respond to a cyberattack, here's the condensed version:
- Detect: Identify and confirm the incident. Document the timeline.
- Activate: Assemble your incident response team. Designate an incident commander.
- Contain: Isolate affected systems, disable compromised accounts, block malicious indicators.
- Eradicate: Remove all attacker footholds. Patch vulnerabilities. Rebuild if necessary.
- Recover: Restore systems in priority order. Monitor aggressively. Validate security controls.
- Learn: Conduct a post-incident review. Update your plan. Train your people.
CISA's incident response guidance at cisa.gov/incident-response provides additional frameworks aligned with federal standards. It's worth bookmarking.
Step 6: Communicate — Internally and Externally
Communication during a cyberattack is where I see the most avoidable mistakes. Too much silence breeds panic internally and legal exposure externally. Too much disclosure too early can compromise your investigation.
Internal Communication
Your employees need to know what's happening — at an appropriate level of detail. Tell them what to do: change passwords, avoid certain systems, report suspicious activity. Don't leave them guessing. Guessing leads to rumors, and rumors lead to leaked information.
External Communication
Work with legal counsel to determine notification obligations. Data breach notification laws vary by state and industry. HIPAA, PCI DSS, GDPR, and state laws like the California Consumer Privacy Act all have specific timelines and requirements.
If customer data was exposed, you'll need to notify affected individuals. The FTC has taken enforcement action against companies that delayed notification or misrepresented the scope of breaches. Transparency — within legal bounds — protects your reputation and limits regulatory fallout.
File a report with the FBI's IC3 at ic3.gov. Even if you don't expect law enforcement to recover your data, the report feeds intelligence that helps protect other organizations.
Step 7: Conduct a Post-Incident Review
Every incident — contained or catastrophic — is a learning opportunity. The organizations that improve after a breach are the ones that conduct honest, blame-free post-incident reviews.
What the Review Should Cover
- How was the attack initially detected? Could it have been caught sooner?
- How long did containment take? What slowed the team down?
- Were roles and responsibilities clear during the response?
- What tools or capabilities were missing?
- Did employees report suspicious activity promptly, or was there a delay?
The answer to that last question often drives the most impactful change. If employees didn't report a phishing email that kicked off the entire attack, that's not a technology failure — it's a training failure.
Turn Lessons Into Action
Update your incident response plan based on findings. Run tabletop exercises quarterly. And invest in ongoing phishing awareness training for your organization that includes realistic phishing simulations. Simulations build muscle memory so employees recognize and report social engineering attempts before they become full-blown incidents.
The Preparation That Makes Response Possible
Everything I've described above assumes you have a plan. If you don't, every step takes three times longer and costs five times more. The NIST Computer Security Incident Handling Guide (SP 800-61 Rev. 2) provides a comprehensive framework for building an incident response capability from scratch.
Three Things You Can Do This Week
1. Write down your incident response plan. It doesn't need to be perfect. A documented plan that exists beats a perfect plan that doesn't. Include contact information, roles, escalation paths, and communication templates.
2. Identify your critical assets. You can't protect everything equally. Know which systems, data, and processes are essential to business operations, and prioritize them in your response and recovery plans.
3. Train your people. Your security awareness program should cover more than annual compliance checkboxes. Employees are your first line of detection. Invest in comprehensive cybersecurity awareness training that teaches them to recognize threats and respond correctly — before an attacker makes the lesson for you.
The Threat Landscape Isn't Slowing Down
The FBI's IC3 2020 report documented $4.2 billion in reported cybercrime losses — and that's just what gets reported. Ransomware attacks surged throughout 2021, hitting hospitals, school districts, municipalities, and businesses of every size. Threat actors are organized, funded, and patient.
Your response capability is the one thing that determines whether a security incident becomes a recoverable event or a headline. Knowing how to respond to a cyberattack isn't just an IT problem. It's a business survival skill.
Build the plan. Train the team. Practice the response. Because the question isn't whether you'll face a cyberattack — it's whether you'll be ready when it happens.