Incident Response Checklist: The First 24 Hours
What you do in the first 24 hours of a suspected cyber incident determines how bad the outcome is. Print this. Save it somewhere you can access if your systems are down.

Incident Response
Checklist:
The First 24 Hours
What you do in the first 24 hours determines how bad the outcome is. This checklist is designed to be used in the moment.
Print this checklist. Save it somewhere you can access if your systems are down.
stealthcyber.io
Before Anything Else
The instinct when something goes wrong is to start clicking around to understand what happened. Resist it. Uncoordinated activity in a live incident destroys forensic evidence, can trigger further malicious activity, and makes the investigation significantly harder.
DO NOT:
- ✕Restart or shut down affected systems without direction
- ✕Delete files, emails, or logs that look suspicious
- ✕Run antivirus scans without guidance
- ✕Log into affected accounts from those same systems
- ✕Discuss the incident over potentially compromised systems
- ✕Post anything publicly or notify clients before legal advice
DO:
Stay calm, work the checklist, and get your security provider on the phone.
Immediate Actions: Contain First, Investigate Second
Assessment and Escalation
Work with your security provider on these items. Do not attempt forensic investigation independently.
Notification Assessment and Stabilisation
Key Contacts: Fill This In Now
| Role | Name | Phone | |
|---|---|---|---|
| Security Provider / IR Team | |||
| Cyber Insurance Claims Line | |||
| Legal Counsel | |||
| CEO / Managing Principal | |||
| IT Provider | |||
| PR / Communications |
After the First 24 Hours
The immediate response phase is about containment and preservation. Once achieved, the work shifts to:
- Full forensic investigation to determine the complete scope
- Eradication of attacker presence from the environment
- Remediation of the vulnerability or control failure that enabled the incident
- Regulated notifications where required
- Rebuilding affected systems from known-clean baselines
- Post-incident review and control uplift
- Client and stakeholder communications
This is a weeks-long process, not a 24-hour one. The first 24 hours determines whether it is manageable or catastrophic.
Signs You May Have an Active Incident Right Now
If any of these are occurring, call your security provider immediately. Do not wait to be certain.

Experiencing an incident?
Stealth Cyber provides 24/7 managed detection and response and incident response services for Australian professional services firms.
If you are experiencing an incident right now, call us.
Emergency Line
AU: +61 7 5230 8381
US: +1 (855) 774-2595
Website
stealthcyber.io
contact@stealthcyber.io
© 2026 Stealth Cyber Pty Ltd. ABN 72 675 840 632. All rights reserved.