Sign in
Follow

What do I do if I get hacked?

It’s really about what you do BEFORE you have been attacked that matters.  You need to be thinking about cyber insurance, cyber training for employees, Incident Response Plans (example), Business continuity plans (more info) &/or Disaster recovery plans (more info) and policies such as the examples I’ve included here:

More example policies can be found here.

However, if you are attacked AND the attack appears serious (potential loss of PII &/or crown jewels) AND you are not prepared with the plans/policies above then they may do the following:

  1. Gather and preserve as much information as possible (server logs, firewall logs, email logs, secure gateway logs, interview people etc.)
  2. Determine the nature of the attack (point of origin, intent, systems compromised, files taken etc…)
  3. Contact appropriate management (keep in mind the board of directors are personally liable for company risk)
  4. Let management determine if FBI, Local Authorities, Forensics, Legal and Insurance contacts should be notified
  5. Segregate all hardware devices suspected of being compromised from other business critical devices
  6. Quarantine instead of deleting
  7. Restrict Internet traffic to only business critical servers and ports.
  8. Disable remote access capability and wireless access points.
  9. If authorities are involved, once they give the OK then re-install the affected system(s) from scratch and restore data from backups if necessary
  10. Make users change passwords.  Consider changing passwords on servers/infrastructure if necessary.
  11. Ensure all systems are fully patched (check WiFI/Routers etc. for necessary firmware upgrades)
  12. Create and execute a Communications Plan–review both regulatory breach notification laws and state breach notification laws.
  13. Assesses the damage to the organization and estimates both the damage cost and the cost of the containment efforts
  14. Last but not least, go into survival mode… as most don’t make it due to loss of reputation.

Comments

Powered by Zendesk