How to Create a Cyber Security Culture
In this world of frequent hacks and attempted hacks, it is more important than ever to foster a cyber security culture in your business. Unfortunately, this is easier said than done.
Keep reading to learn more about how to create a cyber security culture among your employees.
Remember the Basics
There are a few basic cyber security measures that every business should be taking, including the following:
It seems simple, but a strong password is an important step in protecting against a cyber attack. Make sure that you and all your employees are using long passwords that include a mix of capital and lowercase letters, numbers, and special characters.
Update Your Software Regularly
Most software has some glitches in it, no matter how long it's been on the market. While these glitches often aren't even noticeable, they can sometimes make you more vulnerable.
Stay one step ahead of potential attackers and keep your software up to date. This is especially important for programs like antivirus scanners and your firewall.
Not every employee needs access to every part of your computer network.
Limiting access to sensitive data to only those who need to work with it is another simple way that you can create a cyber security culture in your workplace. With access limited, everything is not automatically made available to someone who hacks into one employee's account.
Let Your Employees Know Why They Should Protect Themselves
You understand the importance of cyber security, but your employees might not.
If your employees think your security policies are excessive or unnecessary, they aren't likely to follow them. Make sure you're teaching your employees the importance of cyber security.
There are a few ways you can accomplish this:
Help Them Find Their Motivation
It's important to find what motivates your employees to protect their information. Talk to them about potential security issues and the implications of a security breach.
For example, do they want to protect their families and their personal finances? Making things more personal will help motivate employees to follow through with your cyber security measures.
Discuss The Benefits Of Cyber Security
In addition to personal motivation, talk to your employees about how increased cyber security helps the company as a whole.
Remind your staff that a lack of cyber security may reflect badly on your company.
Your customers or clients want to know that their information is safe. They might take their business elsewhere if they think your employees and the company as a whole do not care about security.
Keep It Simple
It's important not to overload your employees with information. Rather than bombarding them with new programs and policies, start small and figure out which behaviors you want to promote first.
Over time, as your employees get comfortable with initial security measures, you can take things a bit further. If they feel overwhelmed or frustrated by a deluge of information, employees are more likely to resist the changes.
How Do You Create A Cyber Security Culture?
What do you think of our list of tips for creating a cyber security culture? What other steps would you take? Let us know in the comments below!
You can also contact us today to learn more about how to protect your business.
5 Signs You've Suffered An Online Hack
Are you unknowingly leaving your company's system vulnerable to external attacks?
From a low of 18% in 2011, the number of online hacks targeting small businesses has risen to 43% in 2016. And this figure is expected to rise in the next couple of years.
It's safe to say, therefore, that no business or industry is invincible when it comes to these malicious attacks.
Figuring out if you've been a victim of an online hack or not is not so straightforward.
But there are a couple of tell-tale signs which you can rely on when having doubts about the security status of your system.
Let's dive right in.
1. A drop in website performance
If keeping tabs on your website's technical performance is not part of the routine checks you carry out, it's about time you made it a priority.
This is a proven way of picking up on slow or broken processes which could point to an online hack.
For example, It should take an average of 4 seconds or less for a client to checkout of an e-commerce website.
If it's taking longer than usual, this could point to a system breach.
It's advisable to get a free vulnerability assessment just to be sure this is not a hacking attempt.
2. Does your antivirus appear disabled?
If you notice your system's antivirus has been disabled without your knowledge or consent, this is a sign of a much bigger problem.
When hackers infiltrate your system, you'll be unable to re-enable the antivirus.
Disabling the antivirus is a common tactic used by hackers to maintain control and access to your system.
3. Server log activities you can't explain point to an online hack
Have you noticed suspicious activity in your server and website logs lately?
Keeping track of your server logs is an advanced way of detecting hackers trying to gain access to your system.
Keep an eye out for these two common warning signs in your server logs:
4. Getting redirected online searches is a bad sign
Some hackers get paid if they can maliciously redirect internet searches to a different website without the user's knowledge.
You'll end up getting blacklisted for unknowingly sending users to malware-infested sites.
And that's not all. Users being re-directed to other sites means lost revenue for your business and damage to your reputation.
5. You can't explain the origin of new browser toolbars
The main source of unwanted toolbars on your web browser is free online software which comes attached with ''crapware''.
Simply put, crapware is a kind of software you don't need in your system and which gets installed against your will.
Crapware is common in pre-installed programs or self-starting applications which alter your search engine settings.
Pro tip: If you suspect your system has been compromised by an online hack, it's advisable to restore your system to the best-known state before proceeding with further safety measures.
The current wave of cybercrime we're witnessing is worrying, to say the least.
Security managers, therefore, need a more proactive approach to keep online hacks at bay.
And being on the lookout for these signs is a step in the right direction.
You can connect with us round the clock if you suspect your system has been hacked or is under attack. Keeping your online presence safe is our core business!
5 Cyber Security Threats To Look Out For
As the world becomes more technological, so do the cyber criminals.
From bank details to medical records, we store our most sensitive information on the web. Savvy swindlers take advantage of this new arena with a variety of scams designed to rob you of money, information, and identity.
Protect your business by looking out for these common cyber security threats.
Did your dad ever warn you about the danger of paying for things on the internet? Turns out his paranoia could be valid.
A new host of vulnerabilities are available for fraudsters to exploit. They're hidden in the complexities of online payment platforms. Weak points are lurking in virtual wallets and CNP (card not present) transactions.
Mobile transactions are predicted to exceed $220 billion in 2017, an enticing number for a scam-artist seeking a quick win.
How could we forget the recent Wannacry ransomware attack
While criminals promised to send the description keys to unlock your files, crime fighting cyber security experts released the keys free of charge. Ransomware is usually deployed to extort money, and it won't be changing any time soon. The hackers demand a ransom for locked personal or business information against the threat of deleting the precious data forever. On the flip side, vital information is 'kidnapped' until the victim pays for its release.
These types of cyber security threats continue to increase. Avoiding suspicious links and downloads is an effective preventative against ransomware.
Distributed Denial of Service attacks are cyber security threats that aim to make a site useless.
The hacker will infect and commandeer a network of connected devices. This "botnet" overloads the site with requests, preventing users from accessing the service. Hackers use DDoS to extort money, eliminate competition, or make a political statement.
The increasing reliance on website traffic makes DDoS attacks devastating to modern businesses.
The Internet of Things heralds an age when your alarm clocks can instruct your coffee machine to turn on. This interconnectivity of devices can optimize your lifestyle. It can also make it vulnerable to cyber security threats.
Hackers use IoT attacks to steal information, manipulate devices, and launch DDoS attacks.
Most people know the risks of opening unsolicited attachments and strange links. Phishing scams have had to up their game.
These days it's harder to spot a phishing email. They're created with an intimate knowledge of the user, which entices them to click. The dodgy link opens the gateway to malware, which steals information.
The phisher may also use your email to distribute phishing emails to your contacts list.
How to defend against cyber security threats
While the face of cyber security threats is always changing, staying up-to-date on attack trends should be your first line of defense. Educate your staff on the appearance and symptoms of common cyber attacks.
Common password hacks are among the simplest ways for scammers to access your system. Ensure your team practices healthy password hygiene and are vigilant about locking devices.
The help of an information security specialist can help you to further fortify your systems and identify weaknesses before they become real threats. Contact us today and let's protect your business from cyber attacks.
How to Choose the Ideal Cyber Security Company
Looking for a cyber security company? Protecting your business in not a luxury, it's a necessity.
2016 saw more cyber security breaches than any other year on record. In fact, according to the Identity Theft Resource Center (ITRC), 1,093 attacks occurred that year--up 40% from the year before.
The ITRC reports that most of the data breaches were the result of email compromise schemes. The second most common type of breach was the result of accidental email or internet exposure of information--employee errors.
Are You Protected?
The Financial Post reports that about 36% of Canadian IT professionals know their companies have experienced a security breach. Many breaches go undetected and reporting them is critical to your company's future. These breaches can harm not only the business that's been attacked but the clients that are served by the businesses.
An attack has many costs, and one of them is the trust a client puts in you--you may lose that trust and it'll cost you.
Is your company putting its clients and customers at risk for identity theft? If your answer is maybe, read the easy guidelines below that will help you find a cyber security that will meet your company's needs.
Finding the Right Cyber Security Company
Ensure that the company you hire bases its work on the three pillars of cyber security: people, processes, and technology.
Within you company, everyone should receive proper training about how to avoid making your network vulnerable.
At the company you hire, the employees should strive to keep up to date with the most current threats and the technology to thwart them.
Your organization must have standards in place that operate as the rules for how to avoid a cyber attack. These standards should be managed by an information security management system that can be put in place by your own technicians or by the cyber security company you hire.
The technology you employ must be up to date to counter current threats. This should include malware protection, secure mobile and web use for employees, network security, and secure configurations.
Conflict of Interest
Ensure that the firm you want to hire doesn't have a relationship with hardware or software companies that might keep them from having your best interests at heart. Hopefully, you can find a firm that has developed its own technology and isn't relying on someone else.
Going along with the idea of having your best interests at heart, can the firm you're considering tailor their services to your business? Or do they only do one thing for everyone who hires them?
Are They Insured?
Did you know that cyber security companies should carry insurance just like any other contractor you hire?
Who Else has Hired Them?
Find out what other companies trust the firm you're considering. Are some private, some public? Are some commercial and some government?
You want someone who has represented a variety of businesses so that you can benefit from what the firm has learned in dealing with a range of issues your own company may or may not encounter.
In other words, you want the firm you hire to be prepared for anything that may come your way.
What to do
If what you've read has come as news to you, consider finding help. Your business is on the line and the trust your clients and customers place in you is at stake. Act today.
Why North America is Behind in Cyber Security Workforce
It does probably not come as a surprise to you, that there is a severe shortage in the cyber security workforce. Especially in North America. According to the Indeed Spotlight: The Global Cybersecurity Job Gap, the US is ranked 4th in the world for employer demand for cyber security talent.
The Indeed article also tells us that specifically, network security specialists are in high demand. This is the skill set that is most desired by employers on a global level.
Although this news may not be a surprise, you're probably asking yourself, why is it so.
Why's there a Skills Gap in the Cyber security Workforce in North America?
The why of the skills gap in the cyber sector dates back to why the internet was created in the first place. As stated in the Fraser Institute's Cybersecurity challenges for Canada and the United States, "The Internet was designed not with security in mind, but rather an openness and the free flow of information."
Cybersecurity wasn't considered much until recent years. It wasn't until governments corporations, individuals, and the like became to realize the importance of protecting cyberspace.
As so the challenge of how to protect the internet without hindering the freedom it represents was created. The reason North America is behind other countries when it comes to the cyber security workforce boils down to job seeker interest.
Many employers are looking to hire those with advanced degrees and specializations in cyber security. And there are simply not enough of these employees to go around.
Cyber security is not an easy job.
Another reason for the gap in the cyber security industry is it's not a pleasant topic to think about. No one wants to discuss hacking, just as no one wants to discuss what happens in a case of a fire. It's one of those topics that no one does anything about because they don't think it's going to happen to them. Until it does.
This brings to light two imperative topics all companies should consider, and they are The Importance of Cybersecurity Programs and Are the Biggest Cyber Security Risks your Employees. These two topics should no longer be avoided, as the trend for cyber criminal activity continues to rise.
Companies need to stay up to date with all of their security measures.
What can be done about the Cyber security Workforce Gap:
A few options as expressed in a csoonline.com are:
In order to close the cyber security gap in the North American workforce, it's best to implement automated security solutions. This will help relieve the pressure until IT workers can be cross-trained or the interest in the sector picks up. Once the interest in the cyber security industry picks up it'll make it much easier to hire the appropriate staff.
How a Secure Website Can Boost Your SEO
Back in 2014, Google announced that they would introduce HTTPS as a signal for ranking criteria. This was great news for anyone who had a secure website.
However, there were questions. Was a secure website a good point for SEO, or was hardly a drop in the bucket?
If it was a big deal, what type of certificates would help?
There's a lot of questions, and unfortunately, not a lot in the way of answers. However, we're here to help provide some clarification.
How does a secure website boost your ratings?
Using a secure website as a ranking booster is still a relatively untapped way to jump up the Google ladder. Only about 2% of the top million websites redirect to a secure version of that site.
This could be because there aren't that many websites that are secure.
The main benefit to using a secure website is the fact that any user experiences will be secure. This is especially important if a user is transmitting data like credit card information.
Of course, this should be obvious. It's not an up-and-coming cyber security precaution, but it does endure.
You can see if your website is secure by looking at your address bar. If you see "https" before your URL, you're in the clear. Some browsers, such as Firefox and Google Chrome, highlight this in green to bring more attention to the fact.
Security and SEO?
The above may be true, but how does a site security help your website out in the important ranking race?
Google has begun to prefer indexing secure versions of websites over insecure versions.
For the most part, since so few people have made the switch to secure certificates, the use of a secure website acts as a tiebreaker in the race.
For instance, if all other factors are dead on, neck-in-neck, the website which is secure will take precedence over the one that isn't.
Your backups are safe
The great thing about using a secure website is that it doesn't erase your referrals or any of your data. You can switch over to a secure certificate and keep your referrals.
Another plus? It almost guarantees that you'll keep your traffic.
If your website and business relate to sales or other confidential information, it's almost mandatory that you use a security certificate. If you don't you risk your audience dropping off when they see that their information isn't secure.
A security certificate can be a lifesaver when it comes to your Google rankings. While there are still plenty of websites ranking without it, the idea of using a certificate is growing in popularity.
In most situations, so few people have switched to using a certificate that it can't be factored into crucial criteria. However, a certificate can give you a leg up that can be used to break any ties between your site and another.
In the ultra-competitive SEO world, you can take any advantages that you can get. For that reason, you'd be foolish if you didn't make the switch to using a security certificate.
If you have questions regarding cyber security and how to keep your data safe, we're happy to get in touch with you and help you make your website secure.
4 Tips for Better API Security
Application Programming Interfaces (APIs) are everywhere, making life easier for consumers and companies on a global scale. Without API’s the digital economy would surely disintegrate.
Thanks to API’s, sharing data between applications and legitimate developers has become easier than ever before. So has the risk of unintentionally sharing information with hackers.
According to the Identity Theft Resource Center, there have been over 7000 network security breaches since 2005, involving 1000s of data records.
A breach in your API security can have devastating effects on your business, damaging your reputation and your profits.
These 4 security tips can help you save your business.
1. Be Vigilant from the Start
Focus on your mobile app’s software security from the first line of code.
Vulnerabilities in your source code could filter through to your API and beyond, especially in the case of native apps that are downloaded to the client’s device.
Test and re-test your app code for weaknesses before putting it out there. Then protect it with the best encryption you can find and back that up with API encryption.
Keep the client’s needs in mind. Don’t compromise on performance and user experience with heavy-handed security measures.
2. Make SSL/TLS the Rule for All APIs
Secure network connections at the back end are vital. All servers and cloud servers that are accessing an app’s APIs should have security in place to guard against unauthorized data access.
SSL/TLS are the building blocks of secure systems – use them, everywhere. Plus, you get the added SEO benefits that Google dishes out to SSL sites.
SSL is your most effective protection against man-in-the-middle attacks.
Add a VPN to that and you should be okay.
Conduct a vulnerability assessment of your network to reveal weaknesses in your data protection methods.
3. Install Meticulous Identification, Authentication and Authorization Procedures
Your first line of defense in protecting your data is a gatekeeper to separate friend from foe.
The use of identification, authentication and authorization technology will do just that and is vital for your legitimate users to prove who they are when accessing your app.
OAuth2 has become the leading protocol for API security by managing connections securely with one-time tokens. You can configure and customize this framework to suit your needs.
Likewise, OpenID Connect is a made-for-mobile protocol that assigns an ID token to your users, eliminating the need for cross-questioning them more than once with repeated sign-ins.
4. Don’t DIY When it Comes to API Security
Save yourself the risk, expense, and effort of creating your own API security structure. Excellent security systems already exist for API’s - learn to use them.
Putting your security systems in the hands of an expert is often the safest bet. Especially when it comes to protecting yours and your client’s sensitive data.
API security cannot be overemphasized, make yours a priority so that you too can reap the benefits of modern technology to the best advantage.
Talk to us, we can help you today.
WannaCry Ransomware Infects Over 126,000 Computers in 104 Countries
More than 126,000 computers in 104 countries have been infected by the ransomware called “WannaCry”, this according to cybersecurity firm Avast. These latest ransomware attacks appear to be the biggest ransomware assault on the record.
In the UK, the WannaCry ransomware, which affected 16 medical institutions of the National Health Service (NHS), prevented doctors from accessing patient files and caused emergency rooms to divert patients. British Prime Minister Theresa May, while on the campaign trail said, "We are aware that a number of NHS organizations have reported they have suffered from a ransomware attack." The British Prime Minister added, "This is not targeted at the NHS. It is an international attack. A number of countries and organizations have been affected."
The attacks also spread to Russia. Russian Interior Ministry’s Spokeswoman Irina Volk told the Russian News Agency TASS that the ransomware attacked the computers of the Russian Interior Ministry. "As of now the virus has been localized. There have been no inside information leaks from the Russian Interior Ministry’s information resources," Volk said.
In Spain, CCN-CERT – Spain’s Computer Emergency Response Team – posted a security alert on its site about the ransomware attacks that affected several Spanish organizations. Avast reported that WannaCry ransomware mainly targeted Russia, Ukraine and Taiwan.
Cybersecurity firm Kaspersky Lab reported that it recorded over 45,000 attacks of the WannaCry ransomware in 74 countries around the world. Kaspersky said that the actual numbers of those affected could be higher. “It’s important to note that our visibility may be limited and incomplete and the range of targets and victims is likely much, much higher,” Kaspersky said.
How WannaCry Ransomware Infected Computers Worldwide and How It Was Accidentally Stopped
Once a computer is infected by WannaCry, a bright red dialog box appears on the computer monitor with the notice: "Ooops, your files have been encrypted!" This dialog box clarifies that the infected computer’s documents, photos, videos, databases and other files cannot be accessed as they have been encrypted. The dialog box specifies that a victim may recover his or her files by paying a US$300 ransom to be paid in bitcoin. The dialog box also shows that the US$300 ransom payment will be doubled after three days, and if no payment is made after seven days, the encrypted files will be deleted.
In addition to the dialog box, the ransomware also changes the infected computer’s wallpaper with a notice on how to proceed with the ransom payment and decryption process.
The ransomware also drops a text file to the computer with further instruction about the ransom payment and decryption process – an option for those who have closed out the dialog box, or those who have no idea what the dialog box is about.
Spain’s Computer Emergency Response Team CCN-CERT identified the latest ransomware as a variant of the ransomware known as WannaCry. This latest ransomware, CCN-CERT said, is spreading to other computers by exploiting a known remote code execution vulnerability in Microsoft Windows computers. Spain’s Computer Emergency Response Team CCN-CERT added that this malware has the ability to spread itself within corporate networks, without user interaction. “Infection of a single computer can end up compromising the entire corporate network,” CCN-CERT said.
According to Avast, this specific vulnerability in Microsoft Windows was first exploited by Equation Group – a group widely suspected of doing the hacking activities of the National Security Agency (NSA). The hacker group known as ShadowBrokers, Avast said, stole from the Equation Group the hacking tool that exploits this particular vulnerability in Microsoft Windows. On April 14, 2017, ShadowBrokers published on the internet this specific vulnerability in Microsoft Windows and the hacking tool to exploit it – codename “EternalBlue”.
On March 14, 2017, one month before Shadowbrokers made public EternalBlue, Microsoft issued a patch or security update. According to Microsoft, the March 14th patch resolves this specific vulnerability in Microsoft Windows. “The most severe of the vulnerabilities could allow remote code execution if an attacker sends specially crafted messages to a Microsoft Server Message Block 1.0 (SMBv1) server,” Microsoft said. With the extent of these latest ransomware attacks, it appears that many organizations around the world have not yet installed Microsoft’s March 14th patch.
At the height of WannaCry attacks on May 12, 2017, Microsoft issued an update to customers who have not received the March 14th security update. “We also know that some of our customers are running versions of Windows that no longer receive mainstream support. That means those customers will not have received the above mentioned Security Update released in March. Given the potential impact to customers and their businesses, we made the decision to make the Security Update for platforms in custom support only, Windows XP, Windows 8, and Windows Server 2003, broadly available for download …,” Microsoft said in a statement.
The 22-year-old British researcher who goes by the name "MalwareTech" confirmed that he accidentally stopped WannaCry attacks. MalwareTech said that upon realizing that the kill switch’s domain name of WannaCry was not yet registered, he bought the domain name himself. The ransomware attack stopped spreading when the kill switch’s site bought by MalwareTech went live.
How to Prevent Future Ransomware Attacks
To prevent WannaCry attacks, Spain’s Computer Emergency Response Team CCN-CERT recommends the following:
For its part, software company Symantec said that new ransomware variants appear on a regular basis. Symantec recommends the following best practices against ransomware:
We also recommend implementing preventative controls and blocking encrypted Word files from entering the networks via email. While document sharing and collaboration are important, sharing encrypted Word file via email may not be the best, and not the most secure collaboration solution.
Solid detective controls must include ongoing vulnerability assessment and management, and we can help your organization to stay ahead of the pack protecting your most valuable digital assets.
And finally, we highly recommend implementing a cybersecurity awareness program, including comprehensive employee training considering that it’s the first, and the most important line of defense against cyber crime.
The Importance of Continuous Vulnerability Assessment and Management
Cyber security breaches are not a passing trend and the potential threats caused by cyber criminals are real, and on the rise. Especially when taking into consideration the cyber security predictions of 2017.
Because there is so much at risk in the face of solving a security vulnerability, there are just as many reasons as to why continuous vulnerability assessment and management is important. Read on to learn the reasons why it's a must-have for any business.
According to welivesecurity, "When a new vulnerability is reported, it triggers a race against the clock between the various people involved."
This creates quite a bit of stress and puts a heavy workload on the shoulders of the IT department. The fact is that when a vulnerability is uncovered it must be solved in a timely manner to decrease the opening for exposure. This usually means that IT resources are spent around the clock.
Without previous assessment and management of vulnerabilities, you might go above your human resources budget creating another set of problems. Unexpected and increased manpower expenditures are not the only concern when it comes to ways a cyber-attack can cost your company money either.
Having a Continuous Vulnerability Assessment in Place can Save your Company's Reputation
Besides the reasons of time, money, and resources, something else to think about is your company's reputation. Customers do not feel confident trusting a company that cannot keep itself safe from hackers, which can lead to taking their business elsewhere or not using your products or services in the first place.
Keep in mind that most if not all security breaches are publicized. So preventing any issues your company may have pertaining to cyber security will either be spread by word of mouth or in the news.
If you aren't aware of the problems your company has, putting it at risk, you can't fix them. Therefore, you're essentially making your business and your customers a target for cyber criminals who are just waiting for an opportunity to strike.
Keeping up with Technology is Important in Order to Stay Ahead of Cybercriminals
Technology is ever-changing and evolving and companies need to do the same with their security measures if they want to keep up. This is why Tripwire reminds organizations that "security is an ongoing process" and "companies should, therefore, strive towards continuous vulnerability scans to pick up on those constant changes."
By implementing a vulnerability assessment that is automated and completed on a continuous basis, (it cannot be just a one-time thing) you'll be able to see where your company is at risk and prioritize what needs to be taken care of first. As your company grows, automation becomes more important as it helps to keep your IT team efficient and ahead of any potential network security threats.
As you can see, having a continuous vulnerability assessment and management process in place is imperative. Because it will keep your company and customers safe. It will not only prepare you for the future which in turn will save time, money, and valuable company resources, but it'll also help to protect the company's reputation.
Prevention and preparation for any potential online security breach are the best things to have in this day and age.
What to do When Your Company Suffers a Security Breach
Insider and outsider threats are becoming more and more of a problem, as our reliance on technology increases.
At the same time, 30% of email phishing messages were opened without suspicion.
Not to mention, it only took hackers a couple of minutes to infiltrate a system (in 93% of attacks). Within 28 minutes (or less), data exfiltration had been a success in most attacks.
As the Target security breach proves, it doesn't matter how large or small your business is. Cyber security attacks don't discriminate.
Read on to learn what to do when your company has suffered a security breach. How you react and recover from the breach will determine how extensive the financial and legal repercussions are.
Having a response plan is necessary
An effective response plan minimizes damage. Every employee knows what their task(s) is/are. And, because this plan has been practiced several times, they know what to do.
IT starts analyzing the data that's been exfiltrated.
PR begins drafting a statement to the media outlets.
A designated employee (or employees) contact the appropriate law enforcement.
And the US Computer Emergency Readiness Team (US-CERT) or its equivalent elsewhere is notified.
Overall, a formal incident response plan decreases panic and puts your team into action during this stressful time.
What if you don't have a response plan?
So you don't have a response plan in place. Or your response plan isn't as extensive as it should be.
However, you have no time. You just suffered a security breach. What do you do?
You're not alone. This report indicates that only 25% of respondents have a response plan that's across the entire enterprise. Meaning 75% of respondents either don't have a response plan. Or their's doesn't have extensive coverage.
That said, you still have options.
Be as transparent as possible
A security breach puts your business reputation at stake. If the breach isn't handled professionally, you could lose several customers.
To prevent this, go public about the situation and what steps you're taking to mitigate the breach.
This shows to current and potential customers that your business is honest and is doing everything it can to mitigate the damage.
If the hackers exfiltrated personal customer information, let your customers know...IMMEDIATELY. That way, they can call their banks and cancel their credit cards if needed, before the fraud is committed.
Talk to a lawyer
There will be a backlash after a breach. Customers may sue you for damages. You and the hacker(s) may go to court to handle damages and get justice for the breach.
In any case, contacting a lawyer right away is mandatory. He or she will know more about cyber law than you do. And what steps you need to take to protect your business from lawsuits.
Learn from the security breach
Identify how the hackers gained entry. And work to patch up those vulnerabilities. Conduct penetration testing several times per year to see if those vulnerabilities have been taken care of.
Also, put a response plan in place and practice it.
For more cybersecurity information, contact us.