Driz Group
  • Managed Services
    • Web Application Security >
      • Schedule WAF Demo
    • Virtual CISO
    • Compliance >
      • SOC1 & SOC2
      • GDPR
    • Third-Party Risk Management
    • Vulnerability Assessment >
      • Free Vulnerability Assessment
  • About us
    • Testimonials
    • Meet The Team
    • Resources
    • In the news
    • Subsidiaries
  • Contact
    • Newsletter
  • Blog
  • Managed Services
    • Web Application Security >
      • Schedule WAF Demo
    • Virtual CISO
    • Compliance >
      • SOC1 & SOC2
      • GDPR
    • Third-Party Risk Management
    • Vulnerability Assessment >
      • Free Vulnerability Assessment
  • About us
    • Testimonials
    • Meet The Team
    • Resources
    • In the news
    • Subsidiaries
  • Contact
    • Newsletter
  • Blog

Cybersecurity Blog

Thought leadership. threat analysis, news and alerts.

What to do When Your Company Suffers a Security Breach

5/10/2017

0 Comments

 
Security Breach on the computer display

What to do When Your Company Suffers a Security Breach

Insider and outsider threats are becoming more and more of a problem, as our reliance on technology increases. 

According to the Verizon data breach report, ransomware cyber attacks increased by 16%. 

At the same time, 30% of email phishing messages were opened without suspicion. 

Not to mention, it only took hackers a couple of minutes to infiltrate a system (in 93% of attacks). Within 28 minutes (or less), data exfiltration had been a success in most attacks. 

As the Target security breach proves, it doesn't matter how large or small your business is. Cyber security attacks don't discriminate. 

Read on to learn what to do when your company has suffered a security breach. How you react and recover from the breach will determine how extensive the financial and legal repercussions are. 

Having a response plan is necessary

An effective response plan minimizes damage. Every employee knows what their task(s) is/are. And, because this plan has been practiced several times, they know what to do. 

IT starts analyzing the data that's been exfiltrated. 

PR begins drafting a statement to the media outlets. 

A designated employee (or employees) contact the appropriate law enforcement. 

And the US Computer Emergency Readiness Team (US-CERT) or its equivalent elsewhere is notified. 

Overall, a formal incident response plan decreases panic and puts your team into action during this stressful time. 

What if you don't have a response plan?

So you don't have a response plan in place. Or your response plan isn't as extensive as it should be. 

However, you have no time. You just suffered a security breach. What do you do? 

You're not alone. This report indicates that only 25% of respondents have a response plan that's across the entire enterprise. Meaning 75% of respondents either don't have a response plan. Or their's doesn't have extensive coverage. 

That said, you still have options. 

Be as transparent as possible

A security breach puts your business reputation at stake. If the breach isn't handled professionally, you could lose several customers. 

To prevent this, go public about the situation and what steps you're taking to mitigate the breach. 

This shows to current and potential customers that your business is honest and is doing everything it can to mitigate the damage. 

If the hackers exfiltrated personal customer information, let your customers know...IMMEDIATELY. That way, they can call their banks and cancel their credit cards if needed, before the fraud is committed. 

Talk to a lawyer

There will be a backlash after a breach. Customers may sue you for damages. You and the hacker(s) may go to court to handle damages and get justice for the breach. 

In any case, contacting a lawyer right away is mandatory. He or she will know more about cyber law than you do. And what steps you need to take to protect your business from lawsuits. 

Learn from the security breach

Identify how the hackers gained entry. And work to patch up those vulnerabilities. Conduct penetration testing several times per year to see if those vulnerabilities have been taken care of.

Also, put a response plan in place and practice it. 

For more cybersecurity information, contact us. 

0 Comments

Your comment will be posted after it is approved.


Leave a Reply.

    Author

    Steve E. Driz, I.S.P., ITCP

    Picture
    View my profile on LinkedIn

    Categories

    All
    0-Day
    2FA
    Access Control
    Advanced Persistent Threat
    AI
    ATP
    Awareness Training
    Botnet
    Bots
    CASL
    Cloud Security
    Compliance
    COVID 19
    COVID-19
    Cryptocurrency
    Cyber Attack
    Cyberattack Surface
    Cyber Espionage
    Cybersecurity
    Cyber Security
    Cyber Security Consulting
    Cyber Security Insurance
    Cyber Security Risk
    Cyber Security Threats
    Data Breach
    Data Governance
    Data Leak
    Data Leak Prevention
    DDoS
    Email Security
    Fraud
    GDPR
    Hacking
    IoT
    Malware
    MFA
    Microsoft Office
    Mobile Security
    Network Security Threats
    Phishing Attack
    Privacy
    Ransomware
    Remote Access
    Social Engineering
    Third-Party Risk
    Virtual CISO
    Vulnerability
    Vulnerability Assessment
    Web Applcation Security
    Web-applcation-security
    Web Application Firewall
    Web Application Protection
    Web Application Security
    Web Protection
    Windows Security

    RSS Feed

1.888.900.DRIZ (3749)

Managed Services
Web Application Security
Compliance
​Vulnerability Assessment
Free Vulnerability Assessment
About us
Testimonials
​Meet the Team
​Subsidiaries
​
Contact us
​
Blog
Resources & Tools
​Incident Management Playbook
Privacy Policy | CASL
Copyright © 2021 Driz Group Inc. All Rights Reserved.
Photo used under Creative Commons from GotCredit