1.888.900.DRIZ (3749)
The Driz Group
  • Managed Services
    • Web Application Security >
      • Schedule WAF Demo
    • Virtual CISO
    • Compliance >
      • SOC1 & SOC2
      • GDPR
    • Third-Party Risk Management
    • Vulnerability Assessment >
      • Free Vulnerability Assessment
  • About us
    • Testimonials
    • Meet The Team
    • Resources
    • In the news
    • Careers
    • Subsidiaries
  • Contact
    • Newsletter
  • How WAF Works
  • Blog
  • Managed Services
    • Web Application Security >
      • Schedule WAF Demo
    • Virtual CISO
    • Compliance >
      • SOC1 & SOC2
      • GDPR
    • Third-Party Risk Management
    • Vulnerability Assessment >
      • Free Vulnerability Assessment
  • About us
    • Testimonials
    • Meet The Team
    • Resources
    • In the news
    • Careers
    • Subsidiaries
  • Contact
    • Newsletter
  • How WAF Works
  • Blog

Cybersecurity Blog

Thought leadership. Threat analysis. Cybersecurity news and alerts.

5/10/2017

0 Comments

What to do When Your Company Suffers a Security Breach

 
Security Breach on the computer display

What to do When Your Company Suffers a Security Breach

Insider and outsider threats are becoming more and more of a problem, as our reliance on technology increases. 

According to the Verizon data breach report, ransomware cyber attacks increased by 16%. 

At the same time, 30% of email phishing messages were opened without suspicion. 

Not to mention, it only took hackers a couple of minutes to infiltrate a system (in 93% of attacks). Within 28 minutes (or less), data exfiltration had been a success in most attacks. 

As the Target security breach proves, it doesn't matter how large or small your business is. Cyber security attacks don't discriminate. 

Read on to learn what to do when your company has suffered a security breach. How you react and recover from the breach will determine how extensive the financial and legal repercussions are. 

Having a response plan is necessary

An effective response plan minimizes damage. Every employee knows what their task(s) is/are. And, because this plan has been practiced several times, they know what to do. 

IT starts analyzing the data that's been exfiltrated. 

PR begins drafting a statement to the media outlets. 

A designated employee (or employees) contact the appropriate law enforcement. 

And the US Computer Emergency Readiness Team (US-CERT) or its equivalent elsewhere is notified. 

Overall, a formal incident response plan decreases panic and puts your team into action during this stressful time. 

What if you don't have a response plan?

So you don't have a response plan in place. Or your response plan isn't as extensive as it should be. 

However, you have no time. You just suffered a security breach. What do you do? 

You're not alone. This report indicates that only 25% of respondents have a response plan that's across the entire enterprise. Meaning 75% of respondents either don't have a response plan. Or their's doesn't have extensive coverage. 

That said, you still have options. 

Be as transparent as possible

A security breach puts your business reputation at stake. If the breach isn't handled professionally, you could lose several customers. 

To prevent this, go public about the situation and what steps you're taking to mitigate the breach. 

This shows to current and potential customers that your business is honest and is doing everything it can to mitigate the damage. 

If the hackers exfiltrated personal customer information, let your customers know...IMMEDIATELY. That way, they can call their banks and cancel their credit cards if needed, before the fraud is committed. 

Talk to a lawyer

There will be a backlash after a breach. Customers may sue you for damages. You and the hacker(s) may go to court to handle damages and get justice for the breach. 

In any case, contacting a lawyer right away is mandatory. He or she will know more about cyber law than you do. And what steps you need to take to protect your business from lawsuits. 

Learn from the security breach

Identify how the hackers gained entry. And work to patch up those vulnerabilities. Conduct penetration testing several times per year to see if those vulnerabilities have been taken care of.

Also, put a response plan in place and practice it. 

For more cybersecurity information, contact us. 

0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author

    Steve E. Driz, I.S.P., ITCP

    Picture
    View my profile on LinkedIn

    Archives

    March 2023
    February 2023
    January 2023
    December 2022
    June 2022
    May 2022
    February 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019
    September 2019
    August 2019
    July 2019
    June 2019
    May 2019
    April 2019
    March 2019
    February 2019
    January 2019
    December 2018
    November 2018
    October 2018
    September 2018
    August 2018
    July 2018
    June 2018
    May 2018
    April 2018
    March 2018
    February 2018
    January 2018
    December 2017
    November 2017
    October 2017
    September 2017
    August 2017
    July 2017
    June 2017
    May 2017
    April 2017
    March 2017
    February 2017
    January 2017
    December 2016
    October 2016
    August 2016
    May 2016
    March 2016
    January 2016
    November 2015
    October 2015
    August 2015
    June 2015

    Categories

    All
    0-Day
    2FA
    Access Control
    Advanced Persistent Threat
    AI
    Artificial Intelligence
    ATP
    Awareness Training
    Botnet
    Bots
    Brute Force Attack
    CASL
    Cloud Security
    Compliance
    COVID 19
    COVID-19
    Cryptocurrency
    Cyber Attack
    Cyberattack Surface
    Cyber Awareness
    Cyber Espionage
    Cybersecurity
    Cyber Security
    Cyber Security Consulting
    Cyber Security Insurance
    Cyber Security Risk
    Cyber Security Threats
    Cybersecurity Tips
    Data Breach
    Data Governance
    Data Leak
    Data Leak Prevention
    DDoS
    Email Security
    Fraud
    GDPR
    Hacking
    Impersonation Scams
    IoT
    Malware
    MFA
    Microsoft Office
    Mobile Security
    Network Security Threats
    Phishing Attack
    Privacy
    Ransomware
    Remote Access
    SaaS Security
    Social Engineering
    Supply Chain Attack
    Supply-Chain Attack
    Third-Party Risk
    Virtual CISO
    Vulnerability
    Vulnerability Assessment
    Web Applcation Security
    Web-applcation-security
    Web Application Firewall
    Web Application Protection
    Web Application Security
    Web Protection
    Windows Security
    Zero Trust

    RSS Feed

Picture

1.888.900.DRIZ (3749)

Managed Services

Picture
Web Application Security
​Virtual CISO
Compliance
​Vulnerability Assessment
Free Vulnerability Assessment
Privacy Policy | CASL

About us

Picture
Testimonials
​Meet the Team
​Subsidiaries
​Contact us
​Blog
​
Jobs

Resources & Tools

Picture
​Incident Management Playbook
Sophos authorized partner logo
Picture
© 2023 Driz Group Inc. All rights reserved.
Photo used under Creative Commons from GotCredit