Cybersecurity Incident on UW Computer: First Response Checklist


Checklist for users of a UW computer involved in a cyber incident (such as a malware infection or unauthorized third-party access) to protect evidence and reduce further risk. For more details and explanations, see the Incident Response Guide.

On this page:

As you work through the following steps, record your observations and actions, and what time they occurred.

  1. Disconnect the device from the network if it is not a critical service.
  1. Preserve state. If at all possible, don’t touch anything else.
  1. Preserve evidence.
  1. Contact Information Security and your IT support staff by telephone.

The Information Security division wishes to do everything possible to avoid interrupting your workflow while preserving the evidence needed to protect UW data. If your department has IT support, we will be working with them to guide their response, but the information provided here may help to provide context for what we may be asking.