BCM

IT Emergency Card: The Most Important Contacts and Steps on a Single Page

TL;DR
  • The IT emergency card is a one- to two-page document with the most important contacts and immediate actions that should be available at every employee's workplace.
  • The BSI provides a free template that serves as a starting point. Customize it for your organization rather than using it unchanged.
  • The card must contain four things: contact details for key personnel, the first three to five steps in an IT emergency, clear prohibitions (what NOT to do), and a simple classification of when something qualifies as an emergency.
  • For the IT team, there is an extended technical emergency card with IP addresses, credential vault instructions, recovery sequence, and contacts for external service providers.
  • The emergency card must be checked quarterly for current contact information and updated immediately when personnel changes occur.

Why an IT Emergency Card?

It's Monday morning, 8:15 AM. An employee in accounting opens their laptop and sees an unfamiliar message instead of the usual desktop: "Your files have been encrypted." The files are no longer accessible. The employee is not an IT expert. They don't know whether to shut down the laptop, unplug the network cable, or simply wait. They call a colleague, who can't help either. It takes 45 minutes before the right person is informed. In those 45 minutes, the ransomware spreads across the network.

This scenario regularly occurs in organizations that have an incident response plan sitting in a binder somewhere but lack a simple, immediately accessible set of instructions at the workplace. The IT emergency card fills exactly this gap. A functioning incident response plan is the foundation, but the emergency card is the practical, everyday derivative of it.

The IT emergency card is deliberately not a comprehensive document. It's the opposite: a one- to two-page, laminated sheet that hangs at the workplace or sits in the desk drawer. It answers exactly three questions: Who do I call? What do I do immediately? What must I absolutely avoid?

The BSI (Federal Office for Information Security) established the emergency card as a concept and provides a template. This template is a good starting point that you should customize for your organization.

The BSI Emergency Card as a Starting Point

The BSI published the "IT Emergency Card" as a template through the Alliance for Cyber Security. It's designed after the model of fire safety notices and follows a simple principle: in an IT emergency, every employee must immediately know what to do, even without technical knowledge.

Basic Structure of the BSI Template

The BSI template is divided into four sections:

  1. Recognizable heading: "IT Emergency? Act Correctly!" or similar, in large, prominent font.
  2. Emergency number: The one phone number every employee should call in an IT emergency.
  3. Immediate actions: The first steps the employee should take themselves.
  4. What not to do: Clear prohibitions to prevent making the situation worse.

Why You Should Customize the BSI Template

The BSI template is generic. It works as a starting point, but without customization, the company-specific information that makes the difference in an actual emergency is missing. Who is the specific contact person? What is the internal emergency number? Which systems are particularly critical in your organization? What company-specific rules apply?

Take the BSI template as a structure and fill it with your own content. The result is an emergency card that is not just well-intentioned but actually useful.

What Needs to Be on the Emergency Card

The emergency card is aimed at all employees, regardless of their technical knowledge. It must therefore be so simple and unambiguous that it works even in a stressful situation. Every superfluous word, every ambiguity, and every piece of information that is irrelevant at the moment of an emergency does not belong on the card.

Section 1: Headline and Visual Identifier

The card needs an immediately recognizable heading. Large, bold, in a signal color. The employee must be able to identify the card as an emergency card from three meters away.

Example:

IT EMERGENCY? Here's what you need to do now.

Optionally add a symbol or icon (warning symbol, phone), but keep it simple. The card isn't meant to win design awards — it needs to be grasped in a fraction of a second.

Section 2: When Is It an IT Emergency?

Many employees are unsure whether their situation really qualifies as an "emergency." A slow computer is not. An encrypted hard drive is. The card should briefly and clearly define when it should be used.

Example:

It is an IT emergency when:

  • Your screen shows an unknown message (e.g., ransom demand, encryption notice)
  • You notice suspicious activity on your computer that you did not initiate
  • You sent confidential data to the wrong person
  • You clicked a suspicious link or opened a suspicious attachment
  • Systems or data are unavailable and this is not due to planned maintenance

This list doesn't need to be exhaustive. It needs to cover the most common scenarios and give the employee confidence that it's right to report the emergency, even if it later turns out to be a false alarm. Better to report once too many than once too few.

Section 3: The Emergency Number

The centerpiece of the card. A single, unambiguous number that is always reachable during an IT emergency. Not three numbers for different departments, no email address as an alternative, no backup number for "outside business hours." One number. Always.

Example:

Call IMMEDIATELY: ☎ 0800 123 4567 IT Emergency Hotline (available 24/7)

Or internally: Extension 999

If your organization doesn't have a 24/7 service, still provide a number that works evenings and weekends. This could be the mobile number of the on-call IT staff member or an external standby service.

Section 4: The First Steps

After the call, the employee should know what they can do to avoid making the situation worse and to help the IT team. Limit this to three to five steps — no one can remember more in a stressful situation.

Example:

What you should do now:

  1. Stay calm. You did the right thing by calling the emergency number.
  2. Unplug the network cable (if applicable) or turn off WiFi. This prevents a potential attack from spreading to other systems.
  3. Take a photo of the screen. Use your phone to take a picture. The message on the screen often contains important clues for the IT team.
  4. Write down what happened: What were you doing last? When did you notice the problem? Which systems are affected?
  5. Wait for instructions from the IT team. Do NOT shut down the computer unless the IT team explicitly tells you to.

The point "Do NOT shut down the computer" is important and counterintuitive. Many employees think that turning it off helps. In reality, shutting down can destroy forensic traces in the working memory that are critical for analyzing the incident. At the same time, there are situations where shutting down makes sense. The decision should rest with the IT team, not the employee.

Section 5: What You Should NOT Do

This section is at least as important as the action instructions. In a panic, people do things that are well-intentioned but counterproductive.

Example:

What you should NOT do:

  • DO NOT respond to the ransom message or pay the ransom
  • DO NOT try to fix the problem yourself (no virus scans, no file recovery)
  • DO NOT share the incident on social media or with external parties
  • DO NOT forward suspicious links or files to colleagues (not even as a warning)
  • DO NOT connect USB drives or other storage media to the affected computer

The "DO NOT" rules should be highlighted in a prominent color (e.g., red). They are the guardrails that prevent a bad incident from becoming worse.

Section 6: Information for the Report

When the employee calls the emergency number, the IT team needs to quickly get the relevant information. A short checklist on the card helps the employee report the right things.

Example:

Have the following information ready:

  • Your name and department
  • Your location (building, floor, room)
  • What happened? (Brief description)
  • When did you notice it?
  • Which devices or systems are affected?
  • Did you click a suspicious link or open an attachment?

Designing the Emergency Card

The design determines whether the card actually works in an emergency. A poorly designed card will either not be found, not be read, or be misunderstood.

Format and Material

  • Format: DIN A5 (half the size of DIN A4) is ideal. Large enough to be readable, small enough not to hang on the wall as a poster and be ignored.
  • Laminated: The card must be laminated. A non-laminated sheet will be crumpled in a drawer after two weeks or ruined by coffee.
  • Double-sided: Front for the general emergency card (sections 1 to 5), back for the reporting information (section 6) and additional notes if needed.

Typography and Colors

  • Heading: At least 24pt, bold, in a signal color (red or orange)
  • Emergency number: At least 36pt, the largest text on the card
  • Body text: 12 to 14pt, easily readable even in low light
  • "DO NOT" rules: Highlighted in red or with a red background
  • Font: A clear sans-serif typeface. No decorative fonts, no overly thin weights.

Placement

The card must be where the employee will find it in an emergency without having to search:

  • At the workplace: Directly next to the monitor or under the desk shelf
  • In meeting rooms: At the entrance or next to the phone
  • In production areas: At the workstation, at the time clock, at the entrance to the hall
  • Digitally: Additionally as a PDF on the intranet, as a browser bookmark, as a lock screen wallpaper

The combination of physical and digital availability is important. During a ransomware attack, the intranet may no longer work. The physical card must be there.

Extended Emergency Card for the IT Team

The general emergency card is aimed at all employees. The IT team needs an extended version with technical information that must be immediately available in an emergency. This technical emergency card is confidential and distributed only to IT staff.

Contents of the Technical Emergency Card

1. Immediate Actions Checklist (Technical)

If ransomware / active attack is suspected:

  1. Isolate affected systems from the network (unplug network cable, disable WiFi, disable switch port if necessary)
  2. Disconnect internet connection (uplink at router or firewall)
  3. Immediately disconnect backup systems from the network (before they are compromised as well)
  4. Notify the crisis team (see contact list)
  5. Begin forensic preservation (RAM dump before shutdown, disk image)
  6. Secure log files (firewall, domain controller, affected servers)
  7. Check reporting obligations (NIS2: 24h, GDPR: 72h for data breaches)

2. Critical Systems and IP Addresses

System IP Address Location Responsible
Domain Controller 1 10.0.1.10 Server Room HQ Admin Team
Domain Controller 2 10.0.1.11 Server Room HQ Admin Team
Firewall 10.0.0.1 Server Room HQ Network Team
Backup Server 10.0.3.50 Server Room HQ Admin Team
Email Server 10.0.2.20 Cloud (M365) Admin Team
ERP System 10.0.2.30 Server Room HQ ERP Admin
Phone System 10.0.4.10 Technical Room Network Team

This table must contain the systems that are prioritized during recovery. Not every system belongs on the emergency card — just the ten to fifteen most critical ones.

3. Credential Vault

During an emergency, credentials are needed that only a few people know in normal operations: local admin passwords, recovery keys, firewall credentials, cloud admin accounts. These credentials must not appear on the emergency card, but the card must describe where and how to obtain them.

Emergency Credentials:

  • Password Manager: KeePass database on encrypted USB drive in the safe (Server Room HQ, safe code held by management and CISO)
  • Offline Copy: Sealed envelope in bank safe deposit box (Sparkasse Musterstadt, Box 4711)
  • Break-Glass Account: admin.emergency@firma.de (password in sealed envelope, Server Room safe)

The break-glass accounts are emergency accounts with elevated privileges that may only be used during a crisis. Their usage must be logged and audited after the incident.

4. Recovery Sequence

Priority System Max. Downtime Recovery Method
1 Network Infrastructure (Firewall, Switches, DNS) 2 hours Restore configuration backup
2 Domain Controller 4 hours Bare-metal restore from backup
3 Email System 8 hours Cloud failover (M365)
4 ERP System 12 hours VM restore from backup
5 File Server 24 hours VM restore from backup
6 Other Applications 48 hours Per recovery plan

This sequence is based on the business impact analysis and the recovery plan. The emergency card shows the short version; the detailed recovery plan is available separately.

5. External Contacts for Emergencies

Contact Phone When to Contact
IT Security Service Provider (Incident Response) +49 xxx xxxxxxx Upon confirmed security incident
BSI Reporting Office (NIS2) +49 228 99 9582-5500 For reportable incidents (24h deadline)
Data Protection Authority (GDPR) +49 xxx xxxxxxx For data breaches involving personal data (72h deadline)
Cyber Insurance +49 xxx xxxxxxx For incidents with potential damages
Attorney (IT Law) +49 xxx xxxxxxx For extortion, reporting obligations, liability issues
Police (Cybercrime Unit) 110 or direct number For criminal offenses (extortion, data theft)
Phone System Provider (Hotline) +49 xxx xxxxxxx If phone system fails

This contact list must be regularly checked for accuracy. Nothing is worse than calling an outdated number in an emergency and ending up in a queue or reaching a former service provider.

Designing the Technical Emergency Card

The technical emergency card is more comprehensive than the general version. DIN A4, printed on both sides and laminated, is the standard format. Use table structures and numbered lists. Colors help with quick orientation: red for immediate actions, yellow for contacts, green for the recovery sequence.

The technical emergency card is a confidential document. It contains IP addresses, system names, and references to the credential vault. Treat it accordingly: numbered copies, personal distribution to IT team members, return upon team changes.

Distribution and Communication

An emergency card that nobody knows about helps nobody. Distribution and communication are just as important as the content.

Initial Distribution

  • Personal handover: Give each employee the emergency card personally, not via internal mail and not as an email attachment. The personal handover creates awareness and provides an opportunity to briefly explain the card.
  • During onboarding: Every new employee receives the emergency card on their first day as part of the onboarding package. Briefly explain when and how to use it.
  • Ensure placement: Ask employees to keep the card at a fixed location at their workplace. Ideally attached directly next to the monitor or on the desk.

In Awareness Training

Integrate the emergency card into your security awareness program. At least once a year, the card should be covered in a training session or brief reminder. Ideally combined with a practical exercise: "An extortion message just appeared on your screen. What do you do first? Look at your emergency card."

Everyday Visibility

The emergency card must remain visible in daily work; otherwise, it will be forgotten after three months. Some ideas:

  • Desktop wallpaper or lock screen message: "In an IT emergency: Extension 999"
  • Laptop stickers: A small sticker with the emergency number
  • Notice in common areas: Kitchen, hallway, entrance area
  • Intranet homepage: Link to the digital version of the emergency card

Updates: The Biggest Weakness

The most common weakness in emergency cards is not the content but the currency. Contact details change, employees leave, phone numbers are reassigned. An emergency card with an outdated emergency number is not just useless — it's dangerous because it creates a false sense of security.

Review Schedule

  • Quarterly: Check all contact details for accuracy. Make test calls to the numbers. Are the named contacts still in their roles? Is the emergency number reachable?
  • Immediately upon personnel changes: When the CISO, IT manager, or any other contact named on the card leaves the organization or changes roles, the card must be updated immediately.
  • Annually: Review the entire content: Are the immediate actions still appropriate? Do the systems on the technical emergency card still match reality? Are there new reporting obligations or changed deadlines?

Replacement Process

Define a process for replacing outdated cards:

  1. Print and laminate the new version
  2. Update the version number and date (at the bottom of the card)
  3. Distribute new cards to all employees
  4. Collect and destroy old cards
  5. Update the digital version on the intranet

Collecting old cards is important. If an employee has both the old and new card, they may grab the wrong one under stress. Ensure that only one version is in circulation at any time.

Versioning

Even an emergency card needs a version number. A small note at the bottom is sufficient:

Version 3.1 | As of: March 2026 | Next review: June 2026

This way, anyone can immediately see whether their card is current. In audits, versioning provides evidence that the card is regularly reviewed and updated as needed.

Emergency Card and Incident Response Plan: How Do They Fit Together?

The emergency card does not replace an incident response plan. It is the simplified, everyday derivative of it. The hierarchy looks like this:

Incident Response Plan: The comprehensive document with all details on detection, assessment, containment, eradication, recovery, and lessons learned. Typically 10 to 20 pages, aimed at the incident response team.

Technical Emergency Card: The short version for the IT team. Contains the most important immediate actions, contacts, and system overview. 2 pages (DIN A4, double-sided), aimed at all IT staff.

General IT Emergency Card: The version for all employees. Contains only the emergency number, first steps, and prohibitions. 2 pages (DIN A5, double-sided), aimed at every single employee in the organization.

All three documents must be consistent. The emergency number on the general card must be documented as the first point of contact in the incident response plan. The immediate actions on the technical card must align with the procedures in the incident response plan. When you update any of the three documents, check consistency with the other two.

Tabletop Exercise with the Emergency Card

The best method to test the effectiveness of the emergency card is a tabletop exercise. You walk through an emergency scenario, similar to a tabletop exercise, and observe whether employees can find, understand, and correctly follow the card.

Running a Simple Tabletop Exercise

Preparation (30 minutes): Choose a realistic scenario (e.g., ransomware on a workstation, phishing email with credential theft). Define the starting situation and expected responses.

Execution (45 to 60 minutes): Gather a group of five to ten employees from different departments. Describe the scenario and ask: "What do you do now?" Observe whether employees refer to the emergency card, whether they call the emergency number, and whether they follow the immediate actions.

Debrief (30 minutes): Discuss with the group what worked well and where there was uncertainty. Typical findings: the card wasn't within reach, the steps were unclearly worded, employees didn't know the emergency card existed.

Implementing Findings

The results of the tabletop exercise feed directly into improving the emergency card. If employees don't understand the instruction "unplug the network cable" because they don't have a network cable (WiFi only), the card needs to be adjusted. If the emergency number is too long to memorize, a short internal extension is needed. If the "DO NOT" rules weren't understood, they need clearer wording.

Plan at least one tabletop exercise per year that includes the emergency card. The effort is minimal, and the insights are regularly surprisingly valuable.

Checklist: Creating and Distributing the Emergency Card

To wrap up, a compact checklist you can use for creating and rolling out your IT emergency card:

Create content:

  • Define emergency number (one number, available 24/7)
  • Write the "When is it an IT emergency?" definition
  • Define immediate actions (3 to 5 steps)
  • Define "DO NOT" rules
  • Define reporting information
  • Create technical emergency card for IT team
  • Check consistency with incident response plan

Design and production:

  • Create layout (DIN A5 for general, DIN A4 for IT team)
  • Large, clear font, signal colors
  • Print and laminate (sufficient quantity plus spares)
  • Print version number and review date

Distribution:

  • Personal handover to all employees
  • Post in meeting rooms and common areas
  • Make digital version available on intranet
  • Integrate into onboarding process
  • Cover in next awareness training

Maintenance:

  • Schedule quarterly contact information checks
  • Define immediate updates for personnel changes
  • Schedule annual full review in calendar
  • Document replacement process for outdated cards
  • Plan tabletop exercise with emergency card

The Simplest Measure with the Greatest Impact

Of all emergency management measures, the emergency card probably has the best cost-benefit ratio. Creating it takes half a day, printing costs a few euros per copy, and the impact in an actual emergency can mean the difference between rapid containment and uncontrolled spread of an attack.

The 45 minutes the employee from the example at the beginning of this article lost because they didn't know who to call are an eternity in a ransomware situation. Network propagation, encryption of additional systems, data exfiltration — all of this can happen in 45 minutes. An emergency card would have reduced that time to just a few minutes. In ISMS Lite, emergency cards, contact lists, and incident response plans can be managed centrally and automatically updated when personnel changes occur.

Create the card, laminate it, distribute it, train on it, and keep it current. Done. It's not rocket science, but it works — precisely when it matters most.

Further Reading

Print the card, laminate it, and place it at every workstation. It takes an afternoon and costs almost nothing. But when it matters — when the screen suddenly shows an extortion message — the laminated card next to the monitor may be the most valuable piece of paper in the entire organization.

Systematic Emergency Management

ISMS Lite links emergency cards, incident response plans, and recovery plans in one system. Contact details always up to date, immediate actions always at your fingertips.

Install Now