Page 10 - Inside Access November 3rd Edition
P. 10

INFO ZONE
Do not panic and shutdown any suspected compromised system. Rather, follow the necessary steps in the event of a cyber incident which affects any of the following below.
Workstations and ATMs
Curtail the spread on the network by carefully removing the LAN cable to isolate the system. On a laptop, ensure the wireless network is disabled.
Servers(Physical and VMs)
For the above systems, immediately contact Infrastructure Engineering Unit (IT InfrastructureManagement@ACCESSBANKPLC.com) to help take off from the network and for further support.
Taking memory dump of a suspected and compromised system is critical and necessary for a fruitful forensic analysis.
Always escalate such incidents to information and Cyber Security.
For more information, please contact;
IP: 2355, 5108, 5140, 3760
Email: accessadminteam@accessbankplc.com


































































































   8   9   10   11   12