What you should do if your business is hacked!
It is something all businesses dread. You have been hit by a cyber-attack. Despite our best efforts, cyber attacks are on the increase and it is now more of a question of when, not if your business is attacked. Cyber attacks can happen for a number of reasons but research has shown that in 2018, 48% of data security breaches are caused by acts of malicious intent with human error or system failure accounting for the rest.
Looking to improve your Cyber Security? Take a look at our FREE White Paper >>
Given how prevalent security breaches are becoming, it is important to be prepared with a detailed plan of action should you become a target. A poor response can often exacerbate the damage done, so make sure you are equipped with a contingency plan. To help you out, we have gone through some of the do’s and dont’s when responding to a cyber attack.
DON’T panic
Not panicking is a critical step to take directly after suffering a security breach. Take a step back, a cool head on and evaluate the situation. Panicking leads to rash decisions and emotionally driven responses which do more harm than good. A cyber-attack does not mean the end of your business. You can make a full recovery.
DO determine the damage
You have discovered there is a breach, and the initial shock has worn off. What next?
By determining the damage, you will be able to decide how to best deal with the situation. Understandably you want to deal with the breach to sort it as quickly as possible, but sometimes this isn’t beneficial. Without determining the damage and diving straight into it, you can risk making the breach worse.
Assess the extent and severity of the breach and move on from there. Who and what has been impacted? What is the context of the breach?
Gather as much information as possible, it will come in handy later.
DON’T rush
Everyone wants the same outcome, for the breach to be restored and as quickly as possible, however, rushing to do this is not the answer. Every fix needs to be carefully checked and checked again, even if it means taking a bit longer.
DO try to contain the breach
If you can’t resolve the security breach initially, then contain it! Steps to do this may include resetting passwords, installing patches, disabling network access or recalling/deleting information.
Containing the breach helps to reduce the damage that could be caused. When doing this it is important to not do anything that would compromise any investigation.
DON’T keep it to yourself
Whilst you may think you can deal with the breach yourself and control it, keeping it to yourself or on a need-to-know basis is not the right way to go about it. Not only should all staff be informed but all customers who may be affected should be told as well. Remember, customers appreciate honesty. Informing them shows you are in control of the situation and will instill confidence.
When notifying victims of the hack you should communicate to let everyone know what has been accessed/the nature of the hack, what is being done, the likely consequences of it and what plans you have to ensure no attacks similar happen in the future. You may also need to contact banks/credit card companies so that they are aware and can effectively help the victims and your business after the breach.
Additionally, under the GDPR regulation you are required to report it to the Information Commissioner's Office (ICO) without undue delay and no longer than 72 hours. If you fail to do so, you risk a hefty fine. Remember earlier we said it would help to gather information? The more information you provide to the ICO the less likely you are to receive a penalty for the breach.
DO prepare
The breach may be over but that doesn’t mean the threat of security breaches goes. Use the experience to learn from it and your mistakes then how you can prepare for the future if one were to occur again. Think about your response plan, use two-factor authentication and consider all of your network vulnerabilities.
DON’T improvise
When a security breach occurs, it’s easy to jump straight in to try and rectify it without thinking, perhaps when you may not know exactly what’s happened or how to deal with it. Mark Nunnikhoven from Trend Micro says “The first thing you should not do after a breach is create your response on the fly, a critical part of your incident response plan is preparation”.
Go back to your response plan, speak to your team and discuss how you are going to tackle it.
More importantly it’s okay to admit you need help! Bringing in third-party expertise whether that be cyber security experts or investigators can help handle the fallout of the situation. Furthermore, it may be helpful to get legal advice as many firms would have specialist experience on how to deal with security breaches.
DO train your employees
History dictates that human error is the root-cause and weakness of most security breaches. After the initial commotion of the breach and once things have settled down consider implementing staff training on cyber security, threats and how they can learn from the breach to help prevent one in the future.
In recent years we have seen security breaches reach a new level of sophistication. Its best to make preparations before a breach happens and have your cyber security taken seriously by your employees. There is no right or wrong way to handle a security breach as they differ each time one happens depending on the business and nature of the attack. By considering the do’s and dont’s for after a security breach, it could help your cyber security as a whole.
Interested in finding out more about Cyber Security? Download our FREE White Paper >>
Subscribe here!
Recent Posts
Posts by tag
- technology (124)
- Security (97)
- cyber security (85)
- IT Security (81)
- Cloud (65)
- Microsoft 365 (63)
- modern technology (62)
- Managed Service (60)
- business (60)
- cloud computing (59)
- cyber attack (54)
- workplace (54)
- IT support (53)
- cloud it (53)
- Microsoft Teams (52)
- microsoft (51)
- Working from home (50)
- productivity (47)
- office (46)
- cybersecurity (44)
- office 365 (44)
- IT (41)
- Uncategorised (38)
- employees (38)
- entrustit (38)
- flexible work (36)
- Password Security (34)
- Remote (33)
- efficiency (31)
- Hosted Workspace (30)
- hosted desktop (30)
- schools (29)
- independent schools (28)
- school ict (27)
- collaboration (26)
- 2023 (25)
- Cyber (24)
- cyber privacy (22)
- public cloud (22)
- computing (21)
- email security (20)
- password (20)
- it support bournemouth (19)
- passwords (19)
- entrust (18)
- hosted applications (18)
- VoIP (17)
- cloud voip (17)
- covid19 (17)
- hacking (17)
- private cloud (17)
- data (16)
- it support dorset (16)
- teamwork (16)
- Coronavirus (15)
- GDPR (14)
- hackers (14)
- office 365 support (14)
- ransomware (14)
- IT audit (13)
- Protection (13)
- cloud cctv (13)
- covid-19 (13)
- hack (13)
- it support hampshire (13)
- management (13)
- network (13)
- Hosted Desktop and Applications (12)
- Windows Virtual Desktop (12)
- cctv (12)
- hardware (12)
- internet (12)
- it consultancy (12)
- 2020 (11)
- 2022 (11)
- hybrid cloud (11)
- internet safety (11)
- IT costs (10)
- Microsoft Planner (10)
- data breach (10)
- it consultancy bournemouth (10)
- it support southampton (10)
- it support winchester (10)
- phishing (10)
- vulnerabilities (10)
- windows (10)
- windows 10 (10)
- Backup (9)
- bitwarden (9)
- digital (9)
- it consultancy hampshire (9)
- telephony (9)
- attack (8)
- communication (8)
- desk phone (8)
- education (8)
- eu (8)
- it consultancy dorset (8)
- it consultancy southampton (8)
- msp (8)
- planning (8)
- software (8)
- staff (8)
- uk (8)
- Google (7)
- OneDrive (7)
- infrastructure (7)
- mobile (7)
- offsite backup (7)
- outsource (7)
- partnership (7)
- 2019 (6)
- Apple (6)
- Hampshire (6)
- IT Director (6)
- Skype for Business (6)
- apps (6)
- architect (6)
- child protection (6)
- cloud storage (6)
- european union (6)
- hacks (6)
- legal (6)
- legal it (6)
- mobile phones (6)
- onsite backup (6)
- password manager (6)
- remote desktop service (6)
- usecure (6)
- virus (6)
- 3d design desktop (5)
- Azure (5)
- Bournemouth (5)
- Desktop (5)
- ISO (5)
- News (5)
- Risk assessment (5)
- Windows 7 (5)
- awards (5)
- brexit (5)
- designer (5)
- personal data (5)
- resources (5)
- smartphone (5)
- website (5)
- Access Management (4)
- BYOD (4)
- Dorset (4)
- Facebook (4)
- Government (4)
- SharePoint (4)
- VPN (4)
- WannaCry (4)
- ios (4)
- law (4)
- legacy (4)
- proactive (4)
- remote learning (4)
- 2021 (3)
- 2024 (3)
- Attacks (3)
- Case Studies (3)
- General (3)
- Google Drive (3)
- Help (3)
- IP (3)
- Microsoft Forms (3)
- NHS (3)
- New Forest (3)
- Zoom (3)
- big switch off (3)
- budgets (3)
- citrix (3)
- closed cloud (3)
- ddos (3)
- digital hub (3)
- disaster recovery (3)
- guide (3)
- instagram (3)
- internet of things (3)
- meetings (3)
- sme (3)
- storage (3)
- surrey (3)
- teaching (3)
- trump (3)
- twitter (3)
- 2016 (2)
- 2018 (2)
- CAD (2)
- DR (2)
- DR planning (2)
- Environment (2)
- Firewall (2)
- Gen Z (2)
- ISBA (2)
- Local (2)
- Macs (2)
- Microsoft Copilot (2)
- PaaS (2)
- Tiva (2)
- android (2)
- artificial intelligence (2)
- award winning (2)
- bcs (2)
- broadband (2)
- camcloud (2)
- computer performance (2)
- digital transformation (2)
- downtime (2)
- dropbox (2)
- exhibition (2)
- finalist (2)
- innovation (2)
- legalex (2)
- london (2)
- macos (2)
- online meetings (2)
- organisation (2)
- paypal (2)
- predictions (2)
- president (2)
- strategy (2)
- united kingdom (2)
- us (2)
- video conferencing tools (2)
- 1998 (1)
- 5G (1)
- AI (1)
- AMD (1)
- ARM (1)
- Abbey Hill (1)
- Aldwickbury Park (1)
- BBC (1)
- BUNKERS! (1)
- Birchwood Park (1)
- Burhill (1)
- Burhill Group (1)
- Burnout (1)
- CEO (1)
- ChatGPT (1)
- Cloudtango (1)
- GPT-4 (1)
- Go Integrator (1)
- Hoebridge (1)
- Ignite 2018 (1)
- Ignite 2020 (1)
- Leaders (1)
- Loop (1)
- MFA (1)
- MSP Select 2024 (1)
- Market (1)
- May (1)
- Mr Mulligans (1)
- Multi Factor Authentication (1)
- MyAnalytics (1)
- Ninja Warrior UK (1)
- PBX (1)
- PM (1)
- Power BI (1)
- Privacy Shield (1)
- Ramsdale Park (1)
- Redbourn (1)
- Regulation (1)
- Surrey Business Awards (1)
- Sydenhams (1)
- Tech Company of the Year (1)
- The Business Magazine (1)
- Thornbury (1)
- WCry (1)
- WannaCrypt (1)
- Wifi (1)
- Wycombe Heights (1)
- acquisition (1)
- afc bournemouth (1)
- afcb (1)
- ashley madison (1)
- b2b (1)
- bandwidth (1)
- battersea (1)
- beach (1)
- big data (1)
- bloatware (1)
- blockchain (1)
- builders merchant (1)
- cambridge analytica (1)
- canada (1)
- cia (1)
- clinton (1)
- cnn (1)
- copilot (1)
- copilot pro (1)
- copyright (1)
- cryptocurrency (1)
- dark web (1)
- dns (1)
- donald (1)
- dyn (1)
- east grinstead (1)
- election (1)
- equality (1)
- executive order (1)
- farnham (1)
- fax (1)
- football (1)
- gchq (1)
- grinstead (1)
- intel (1)
- intelligence (1)
- josh widdicombe (1)
- landmarks (1)
- learning (1)
- legal technology forum (1)
- machine learning (1)
- meltdown (1)
- millennials (1)
- mirai (1)
- no-deal (1)
- onsite (1)
- paper (1)
- patisserie valerie (1)
- performance reviews (1)
- pound (1)
- premier league (1)
- procrastination (1)
- recruitment (1)
- research (1)
- serval systems (1)
- sharefile (1)
- smishing (1)
- snowden (1)
- solent (1)
- solent business awards (1)
- solentBA (1)
- spectre (1)
- sterling (1)
- storm (1)
- talktalk (1)
- trumppresident (1)
- ukitawards (1)
- united states (1)
- usa (1)
- vault 7 (1)
- vitality stadium (1)
- whatsapp (1)
- white (1)
- white house (1)
- wikileaks (1)
- wireless internet bournemouth (1)
- wireless internet southampton (1)
- women in business (1)
- xiongmai (1)
- year (1)