Special Agent Chad Hunt provided the following links as resources in assessing and protecting against cyberthreats:
Best Practices for Victim response and Reporting of Cyber Incidents:
http://www.justice.gov/criminal/cybercrime/docs/04272015reporting-cyber-incidents-final.pdf
· DEPARTMENT OF JUSTICE WHITE PAPER Sharing Cyberthreat Information Under 18 USC § 2702(a)(3):
https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/03/26/guidance-for-ecpa-issue-5-9-2014.pdf
· Ransomware Brochure:
https://www.fbi.gov/about-us/investigate/cyber/ransomware-brochure
· Incidents of Ransomware on the Rise Protect Yourself and Your Organization:
https://www.fbi.gov/news/stories/2016/april/incidents-of-ransomware-on-the-rise/incidents-of-ransomware-on-the-rise
· Criminals Continue to Defraud and Extort Funds from Victims Using CryptoWall Ransomware Schemes:
https://www.ic3.gov/media/2015/150623.aspx
· Extortion E-mail Schemes Tied to Recent High-Profile Data Breaches:
http://www.ic3.gov/media/2016/160601.aspx
· Strategies to Mitigate Targeted Cyber Intrusions:
http://www.asd.gov.au/infosec/top-mitigations/mitigations-2014-table.htm