Risk Management May 1, 2026

What To Do In The First Hour After A Cyber Attack

The first hour matters. Slow down, contain the problem, preserve evidence and get the right people involved.

The first hour after a cyber attack is one of those security topics that looks simple until it becomes urgent. The practical answer is rarely one tool or one rule. It is a set of habits, checks and decisions that make the safer action easier. If you want the wider context first, start with cyber risk and response planning; this article turns that pillar guidance into a focused checklist for businesses and teams responding to a suspected incident.

The first hour can determine whether an incident is contained or made worse by panic. The risk is not only technical. It usually involves people, timing, pressure and unclear ownership. That is why the best approach combines plain-English rules, a few technical controls and a clear response plan.

Why first hour incident response matters

Teams need to preserve evidence, stop ongoing access and communicate carefully. It also matters because small gaps tend to connect. A weak password can turn into an account takeover. A rushed payment can turn into invoice fraud. An unclear AI rule can turn into data leakage. A child’s compromised account can turn into wider family risk. Good security works by reducing the number of easy next steps available to an attacker.

For What To Do In The First Hour After A Cyber Attack, NCSC incident management guidance is a useful reference point. Use it to check the core controls, then adapt the advice to the specific people, tools and data involved.

In the first hour, slow down enough to make the right fast decisions.

The most common warning signs

The warning signs for What To Do In The First Hour After A Cyber Attack are easiest to catch when the team knows what normal looks like. Pay attention to unusual requests, new permissions, unexpected alerts and any process that depends on one person remembering an informal workaround.

  • Unknown logins or password resets.
  • Files encrypted or missing.
  • Unusual mailbox rules.
  • Supplier reports suspicious messages from your account.
  • Bank or customer fraud alerts.

A practical checklist

Use this checklist for What To Do In The First Hour After A Cyber Attack as a working routine, not a one-off exercise. Start with the first few actions, then return to the rest once the basic habit is in place.

  • Identify what happened and what is still happening.
  • Assign an incident lead.
  • Preserve evidence.
  • Reset affected credentials and revoke sessions where appropriate.
  • Protect backups.
  • Contact insurer, IT provider or bank if relevant.

What to do first

Write down the time, symptoms, affected systems and first actions before changing too much. The first step should be small enough to do today. Security improvements often fail because the first action is too ambitious. A simple change that is completed now is more valuable than a perfect plan that never starts.

Situation Better response Why it helps
Email compromise Revoke sessions and check forwarding rules Stops persistence
Ransomware Isolate affected devices Limits spread
Payment fraud Call bank immediately Time matters for recovery

Mistakes to avoid

A common mistake with What To Do In The First Hour After A Cyber Attack is assuming the first setup will stay correct forever. Review it when tools, people, suppliers or habits change, because those changes are usually where old controls start to fail.

  • Deleting evidence before understanding scope.
  • Announcing details too early.
  • Letting everyone make changes at once.
  • Forgetting legal, insurance or customer obligations.

How this connects to the wider security plan

First-hour response should be prepared through the risk register and incident plan before a crisis. This is where internal linking is useful for readers too: a focused article answers the immediate question, while the pillar article shows where the topic fits in the larger security system.

For related next steps, read small business security checklist and phishing response guidance. Those guides cover the surrounding behaviours that make this topic easier to manage over time.

A simple monthly review

For What To Do In The First Hour After A Cyber Attack, a monthly review can be short: what changed, what failed, and what still depends on memory? Those three questions catch drift before it becomes an incident.

Write the current answer for What To Do In The First Hour After A Cyber Attack somewhere people can actually find it. A shared note, checklist or risk register entry is enough if it is kept current.

Final recommendation

Contain, preserve, assign ownership and communicate carefully. The first hour should reduce uncertainty, not create more of it. Security is strongest when the right thing is also the easy thing. Reduce friction, remove unnecessary exposure, document the few decisions that matter, and review the setup before small gaps become expensive incidents.

For What To Do In The First Hour After A Cyber Attack, make ownership explicit. Name who reviews the setting or decision, and set a realistic date for checking it again.

For What To Do In The First Hour After A Cyber Attack, make the next review easy to run. Name the person or role that checks the control, and connect the review to a normal routine such as onboarding, supplier review, family device setup or a monthly security check.

For What To Do In The First Hour After A Cyber Attack, make the next review easy to run. Name the person or role that checks the control, and connect the review to a normal routine such as onboarding, supplier review, family device setup or a monthly security check.

For What To Do In The First Hour After A Cyber Attack, make the next review easy to run. Name the person or role that checks the control, and connect the review to a normal routine such as onboarding, supplier review, family device setup or a monthly security check.

For What To Do In The First Hour After A Cyber Attack, make the next review easy to run. Name the person or role that checks the control, and connect the review to a normal routine such as onboarding, supplier review, family device setup or a monthly security check.

For What To Do In The First Hour After A Cyber Attack, make the next review easy to run. Name the person or role that checks the control, and connect the review to a normal routine such as onboarding, supplier review, family device setup or a monthly security check.

Free PDF guide

Download The AI Sentinel

A strategic guide to securing the intelligent enterprise: risks, governance and defence-in-depth for 2026.

The AI Sentinel guide cover