Loading
Get Dhs Ransomware Self-assessment Tool 2020-2026
How it works
-
Open form follow the instructions
-
Easily sign the form with your finger
-
Send filled & signed form or save
How to fill out the DHS Ransomware Self-Assessment Tool online
The DHS Ransomware Self-Assessment Tool is designed to assist financial institutions in evaluating their preparedness for ransomware attacks. This guide provides clear, step-by-step instructions to help you complete the assessment accurately and effectively.
Follow the steps to complete the assessment with confidence.
- Press the ‘Get Form’ button to acquire the form and open it for editing.
- Complete the 'Preparer Information' section by entering the name and title of the individual preparing the document, as well as their email, phone number, institution name, and the dates completed and reviewed by the board.
- Move to the 'Identify/Protect' section. Answer the questions about implemented controls to mitigate cyber-attacks, and check all applicable standards or frameworks used in your institution.
- Continue through the 'Identify/Protect' section, addressing each question regarding GAP analysis, cyber insurance, data management, remote access controls, and risk assessments. Provide explanations where necessary.
- Proceed to the 'Detect' section and follow the prompts to indicate the monitoring practices your institution utilizes.
- Next, in the 'Respond' section, identify key persons for managing ransomware responses and outline the procedures included in the Incident Response Plan.
- Finally, complete the 'Recover' section by detailing return-to-normal operations procedures and any comments related to the assessment.
- Once all sections are filled out, review your responses for accuracy, save your changes, and proceed to download, print, or share the form as required.
Take action now and complete the DHS Ransomware Self-Assessment Tool online to ensure your institution is prepared.
Respond to a ransomware attack Step 1: Record important details. It is important to record important details about the ransomware attack to help you: ... Step 2: Turn off the infected device. ... Step 3: Disconnect your other devices. ... Step 4: Change your important passwords.