Loading the Elevenlabs Text to Speech AudioNative Player...

Cybersecurity for Business

Jul 1, 2022

|

2

2

2

Min Read

Respond to Cyber Incidents

Do you have a plan in place to respond to cyber incidents at your business?

Cyber Incidents
Cyber Incidents
Cyber Incidents

Having a recovery plan created before an attack occurs is critical. Make and practice an incident response plan to contain an attack or incident and maintain business operations in the short term. Even when we take all the precautions we can, incidents can still happen. Being prepared to respond in a thoughtful and comprehensive manner will reduce risks to your business and send a positive signal to your customers and employees.

The good news is, preparing to respond to a cyber incident is in not unlike preparing for other events that could impact your business like natural or manmade disasters. Building your cyber incident response can tap your other operational knowledge and experience.

Quick Wins
  • Disconnect the affected computer(s) from the network and connect with IT leadership (Whether that’s internal to your organization or a third party vendor), law enforcement and your legal representation.

  • Utilize spares and backup while continuing to capture operational data.

  • Switch to paper. Are electronic records unavailable? Have processes for operating by paper to keep the business functioning. You need to understand how you would access some key information if your systems were down.

  • Familiarize yourself with your state’s data breach notification law.

Additional Resources

AT&T
Federal Bureau of Investigation
Federal Communications Commission (FCC)
Federal Trade Commission (FTC)
National Conference of State Legislatures
U.S. Department of Homeland Security

Featured Articles

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

How You Can Help Secure Smaller Vendors with Limited Budgets and Know-How

If you work in third-party risk management (TPRM), you face a growing challenge: how to keep your supply chain secure when many vendors are small businesses with limited cybersecurity resources?

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Your Business Has Been Hacked: How to Minimize the Damage

If your small business has been hacked, you need to act fast. Here are some key things to know to fight back, stay open, and build resilience in the event of a cyberattack.

Business