Office of the Chief Information Officer

United States Department of Agriculture

What To Do If You Think You’ve Been Breached

  • Step 1–Turn off your computer
  • Step 2–Report the suspected incident to your supervisor
  • Step 3–The supervisor reports the suspected incident to the agency Information Systems Security Program Manager
  • Step 4–The ISSPM reports the suspected incident to the ASOC Incident Handling Division

Has Your System Been Breached?

Unfortunately, many different types of computer vulnerabilities are common in our technology-centered world. That means that breaches may show up in many different ways.

The most obvious sign of a breach is when a device no longer operates normally. Here are some signs for concern:

  • Performance suddenly slows down
  • Strange things pop on screen
  • Familiar application functions no longer work properly
  • Your browser homepage changes without intervention
  • Clicking on Google-provided links sends you to random pages
  • Your browser has trouble connecting to the Internet

The good news is that these symptoms aren’t always caused by a breach. But only an expert can tell, so you should report all such anomalies immediately.

 

ASOC provides the security tools and services USDA needs to protect its systems and information.


Fighting Hidden Threats

Sophisticated, subtle threats can only be detected by experts or security technology:

  • ASOC incident handlers may alert the ISSPM of a breach
  • An intrusion detection device may identify an attack
  • Anti-virus software may fire in response to malicious code
  • A vulnerability scan may detect technological evil lurking in the depths of a server that is critical to your mission

ASOC analysts and forensic investigators constantly work with your agency’s security department to detect and remove potentially malicious software—before it does any damage or can be transmitted to other systems.