Cyberthreats

Special Agent Chad Hunt provided the following links as resources in assessing and protecting against cyberthreats:

 Best Practices for Victim response and Reporting of Cyber Incidents:
http://www.justice.gov/criminal/cybercrime/docs/04272015reporting-cyber-incidents-final.pdf              

·         DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC § 2702(a)(3):
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/guidance-for-ecpa-issue-5-9-2014.pdf             

·         Ransomware Brochure: 
https://www.fbi.gov/about-us/investigate/cyber/ransomware-brochure 

·         Incidents of Ransomware on the Rise Protect Yourself and Your Organization:
https://www.fbi.gov/news/stories/2016/april/incidents-of-ransomware-on-the-rise/incidents-of-ransomware-on-the-rise

·         Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes:
https://www.ic3.gov/media/2015/150623.aspx

·         Extortion E-mail Schemes Tied to Recent High-Profile Data Breaches:
http://www.ic3.gov/media/2016/160601.aspx

·         Strategies to Mitigate Targeted Cyber Intrusions:
http://www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm