" Organizations and their information systems face increasingly #risks and uncertainties from a wide variety of sources, including computer-based fraud, espionage, sabotage or cyberattacks. The present paper intends to provide a series of actions, procedures, and considerations that any organization must contemplate when dealing with a cyber-attack. Certain sources of damage such as intrusion attacks or denial of services are becoming more common, ambitious and sophisticated over the time. Absolute #security does not exist. That is why organizations must adopt methods and strategies that allow them to prioritize those risks that, due to their probability of occurrence and level of impact, represent a greater potential harm to the business. When preparing to deal with probable cyber-attacks, the key is understanding the logical flow of actions that could be performed during the attack, incorporate best practices assess the levels of risk faced by the organization and proactively design a handbook to react during these scenarios. " https://lnkd.in/gtxDqkgw