Incident response in the event of a phishing attack should include both preparation and post-incident phases. It is also important to educate your colleagues so that they can recognize the signs ...
Leonard, Dutch, and Arnold M. Howitt. "Against Desperate Peril: High Performance in Emergency Preparation and Response." Chinese Emergency Management 1 (2007): 34–37.