Select Page
Your Cyber Emergency Checklist.
Purple-tinted photo of a team in business suits running toward the camera, with large overlay text: “If a cyber incident landed in your lap today, would your team have a next step? (Most companies find out only after the scramble starts.)” Reintivity logo in the bottom corner.

Click the image to view the guide.

If a cyber incident landed in your lap today, would your team have a next step?

Most companies do not. Not because they do not care, but because panic is a terrible project manager. In the first hour, confusion costs time. Time costs data. Data loss costs trust.

You do not need a 50-page incident response manual. You need a short “break-glass” checklist that people can follow under pressure.

Below is a practical first-hour plan you can adapt to your business.

1) Name your first responders

Decide who leads and who supports before anything happens.

  • Your IT support partner or managed services provider
  • An internal tech lead (primary point of contact)
  • A business decision-maker who can approve downtime actions

Make it explicit. If people have to guess who to call, they will call everyone, or no one.

2) Create one contact list that cuts through chaos

Build a simple list and keep it current:

  • Key staff and department owners
  • Leadership and directors
  • External IT support and security partners
  • Cyber insurance contact
  • Any regulators or reporting contacts relevant to your industry

Store it somewhere accessible if email is down. A printed copy in a secure location is not old-fashioned. It is practical.

3) Contain first, investigate second

Quick isolation limits damage. Your checklist should include clear “do this now” steps like:

  • Disconnect affected devices from the network (Wi-Fi and wired)
  • Lock or disable compromised accounts
  • Pause systems that could spread risk

Containment is not the moment to optimize for convenience. It is the moment to stop the bleeding.

4) Identify business essentials and the offline plan

Write down what you must have to operate:

  • Phones and calling routes
  • Email and messaging
  • Payment and invoicing tools
  • Client files and case systems

Then define a fallback. If email is unavailable, how do teams communicate? If payment systems are offline, how do you take orders or process invoices? If client files are inaccessible, what is the minimum workflow to keep services moving?

5) Decide your communication Plan B

No communication creates panic and rumor. If email is down, what is the backup?

  • Phone tree
  • Group SMS
  • Teams or chat on cellular data
  • A designated status line or message that staff can check

Pick one primary backup and one secondary. Too many options becomes another form of chaos.

6) Prepare a calm client message

You do not want to write your first customer update while the situation is unfolding.

Have a short, steady statement ready, like:

“We are investigating a technical issue. Protecting your data is a priority. We will share updates as we learn more.”

Keep it factual. Avoid guessing cause or impact until you know.

7) Assign a scribe

Incidents are loud and stressful. Details disappear quickly.

Assign one person to document:

  • What happened
  • When it was discovered
  • Which systems were affected
  • What actions were taken, by whom, and when

This log helps with recovery, insurance, and any required reporting. It also prevents “we think we did that” confusion.

8) Bring systems back only when it is safe

Restoring too early can reinfect everything. Your checklist should require:

  • Root cause identified (at least at a working level)
  • Threat removed or contained
  • Backups confirmed clean before restore

Do not rush the “back to normal” moment. A fast restore that reopens the door is not progress.

9) After the dust settles, improve the playbook

When things stabilize, run a brief after-action review:

  • What worked
  • What slowed you down
  • Which controls need improvement
  • What staff training needs to change

Then update the checklist. The plan should get better each time you test it.


One of the easiest ways to reduce incident frequency is MFA.

In a crisis, you will not invent a perfect process. You will use the plan you already prepared. If you want help building a break-glass checklist, running a tabletop exercise, or tightening your first-hour response, Reintivity can help.

Mastodon