An intrusion within a business where sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an unauthorized individual.
The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident or chat with an online support specialist at the FTC Complaint Assistant. The FTC will create a report number and a copy of the report for your records.
The more national reporting data that’s collected, the better the chance law enforcement has to catch the criminals and decrease online crime. Reporting a fraudulent incident will also assure that you have accurate documentation in order to aid in your recovery. Please consider reporting your incident to the FBI Internet Crime Complaint Center (IC3).
Once processed, complaints filed via their website may be referred to federal, state, local, or international law enforcement or regulatory agencies for possible investigation. Any investigation opened on any complaint is initiated at the discretion of the law enforcement and/or regulatory agency receiving the complaint information. Reporting the incident at IC3 will not result in a call back for assistance.
The following resources have been gathered and vetted in order to better serve you. These resources have been chosen to help simplify the process of recovery after a cyber incident has taken place. With these resources you may need to contact organizations outside Fraudsupport.org. Results will vary depending on your circumstances.
- Start with these guides from the Federal Trade Commission.
- Start on Page 12 of this document for tips on how to respond to a cyber incident.
- Report any business data breaches to the government based on current laws. Consult with a lawyer about the Cybersecurity Information Sharing Act – Frequently Asked Questions.
- Find the Breach Notification Laws by State.
- If medical (HIPPA) data was stolen, follow this guidance from the U.S. Department of Health & Human Services.
- If your account is taken over, visit this site for some guidance – Email Accounts and Social Networking Sites by Identity Theft Resource Center.
- FTC Guidance, “What To Do When You’ve Been Hacked”
Once the proper organizations have been notified and you are on the road to recovery, it is time to reinforce your cybersecurity. Let’s take action and strengthen your cybersecurity with the following resources and tools.
- Add Two-Factor Authentication to key accounts and follow other security tips at LockDownYourLogin.org
- Is your home or business router secure?
- Cybersecurity for Small Business by the FTC: “Do your vendors have access to sensitive information?”