Business Continuity NewsBriefs - September 19, 2018
These NewsBriefs are produced and delivered weekly by Attainium to keep our friends and clients current on topics relating to Business Continuity, Disaster Recovery and Crisis Management.
Recovering from a Data Breach or other Cyber Attack
September 19, 2018 - Statistically speaking, as you read this, you could become the victim of a data breach or cyber attack. We hope that is not the case. But, given the prevalence of such attacks, you should certainly have a plan of how to deal with one should an attack happen. If you have been hacked, you might want to read Item #6. If not, the other articles could be helpful to you.
QUOTE OF THE WEEK
"Until you have experienced something like this, you don't realise just what can happen, just how serious it can be."
-- Maersk CEO Soren Skou --
1. How to Recover from a Data Breach
Cyber attacks and data breaches are clearly huge risks for organizations. It's important to do everything possible to prevent incidents, but it's just as important to have a plan in case disaster strikes.
https://www.itgovernance.eu/blog/en/how-to-recover-from-a-data-breach
2. Data Breach Experts Share the Most Important Next Step You Should Take After a Data Breach
Many successful companies of today are well aware of common data security issues and put a great deal of trust into their own efforts towards preventing a data security breach. However, as demonstrated by recent security breaches of several large, tech-savvy companies, no set of security measures is completely infallible to a breach. What businesses of today have to then consider is: what is your plan of action after a data breach when your security and data loss prevention measures have failed?
https://www.business.com/articles/data-breaches-how-to-deal-with-them-and-recover/
3. What To Do Before and After a Cybersecurity Breach?
Cybersecurity breaches affect organizations in different ways. Reputational loss and decreased market value have often been cited as significant concerns. Loss of confidential data and compromising competitiveness of a firm can also cause havoc. There is no doubt that preventive mechanisms need to be put in place. However, when an IT security breach does occur, what should be the response strategy?
https://www.american.edu/kogod/research/cybergov/upload/what-to-do.pdf
4. The Hidden Costs of Data Breaches
Most company senior executives and board members have no clue how to gauge the full scope of financial trauma engendered by a major network breach. How does one calculate the value of lost trust of customers who take their patronage elsewhere after a well-publicized cyber attack, for instance? Lost future sales generally are not accounted for in calculating cyber attack costs. A lack of planning for such variables potentially could cost companies significantly more in recovery.
https://cyberscout.com/education/blog/infographic-the-hidden-costs-of-data-breaches
5. Four Security Measures Companies Implement After a Breach
If you're recouping from a breach, you definitely want to double down on security so you can regain your consumers' confidence. It is possible, and with some thoughtful upgrades, you'll be able to move past your mistakes. While there is no magic security system that will guarantee 100% protection, these four measures will bring you closer to an impenetrable defense.
https://auth0.com/blog/4-security-measures-after-data-breach/
6. The Avoidable Mistakes Executives Continue to Make After a Data Breach
Top executives continue to stumble in the way they respond to an attack, magnifying and extending the damage both to their reputation and their customers. In analyzing the top breaches over the past few years, it is clear that executives make a set of common mistakes, which is surprising given that so many companies, often led by otherwise effective leaders, fail to learn from the botched responses and mishandled situations of the companies that were breached before them.
https://hbr.org/2017/11/the-avoidable-mistakes-executives-continue-to-make-after-a-data-breach
Copyright (C) 2018 Attainium Corp - All rights reserved.