Business Continuity NewsBriefs - September 13, 2017
These NewsBriefs are produced and delivered weekly by Attainium to keep our friends and clients current on topics relating to Business Continuity, Disaster Recovery and Crisis Management.

Recovering from a Data Breach or Cyberattack

September 13, 2017 - If your company has never had a data breach, consider yourself lucky. These days, such breaches are nearly inevitable and can cause considerable damage to your bottom line (at a cost of about $214 per compromised record and customer turnover) and your reputation. In order to survive such a breach, it's critical that you know what to do afterwards. You can recover, but your best bet is to have a recovery plan and to follow it. These articles can help you determine what you should -- and shouldn't do -- after a breach.

"But when your security measures fail and sensitive business data does escape, when and how your company responds can make the difference between a short-term crisis and a long-term calamity."  
-- Matthew McKenzie, allBusiness --

1. Have You Been Hacked? How to Recover from a Data Breach

Every business is at risk for being hacked --- especially small businesses. Being in that constant vulnerable state is terrifying, but the reality of actually experiencing a security breach can be even worse. It's likely impossible to regain control of everything the hackers accessed, but you can still take action and salvage your trusted reputation with your customers and clients, if you're properly prepared for an attack.

2. Data Breaches: How to Deal with Them and Recover

The smaller a company is the larger an impact a hack can have as losing a few main clients can cripple cash flow in startups and small businesses. With more and more information being kept electronically it is inevitable that some businesses will encounter a hack that leads to the information of employees and/or customers being let into the hands of a hacker or hacker group. Below are some ways to deal with the different aspects of a data breach and how a company can recover.

3. Recovering from a Data Breach: A Step-by-Step Guide

The nature and source of cyber-attacks varies and your recovery procedure should cover each eventuality from scams to ransomware, data breaches to social engineering schemes. The ability to identify and contain the threat as well as to recover control over your data is essential and can help you learn how to boost your defenses to prevent a recurrence.

4. What to do to recover from a cyber attack

More companies are falling victim to cyber attacks, as a wide range of harmful software, social engineering schemes and scams threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the increase every year, it is important for businesses of all sizes to have a recovery plan in place to mitigate any losses. In the unfortunate event of a data breach, these are the steps you should take to recover.

5. Recovering from a Data Breach: Three Steps to Combat Vulnerabilities

Data breaches are prevalent and it is a matter of time before an organization faces something similar. Therefore, you must always be ready with a response plan that can help mitigate the consequences while allowing you to keep up with the latest industrial threats --- including ransomware, digital hacks and a lot more. The idea here is to keep technical and legal experts on-board who can share insights and help the organization survive the aftershock.

6. Five Things Not to Do After a Data Breach

Thousands of words have been written about how to prevent cyber attacks and what to do if you've been targeted. You're probably already familiar with terms such as endpoint protection and data backup and recovery. These solutions and services are great for protecting you and helping you get back up and running once an attack has been resolved. Unfortunately, there's no standard playbook for a data breach and your actions during a disaster could be as harmful as they are helpful.

Copyright (C) 2017 Attainium Corp - All rights reserved.