Skip to content

Cyber Incident Response Plan Final

3D rendering. Abstract background concept of cyber security and attack, system crash.

What You Should Include in a Cyber Incident Response Plan

Data breaches or ransomware attacks are a scary reality for any small to medium enterprise. If you operate on the grid (or store your information on the cloud), your whole company could be at risk of a cyber incident at all times.

Statistics estimate that the average company could be affected by a virtual attack on its systems every 5 seconds. This figure might even be an underestimation of the actual danger.

The importance of a cyber incident response plan is to protect your company, your employees and your customers in the event of an attack.

Here are 5 things to do if your company is affected by a ransomware attack or data breach.

 

1. Escalate the Issue

The first thing anyone in the company should do in the event of a ransomware attack or data breach is to escalate the issue to the correct department. Stop using linked, active systems immediately, and inform the appropriate company sector that you suspect there has been an attack or breach on the system.

This allows for quick damage control and immediate action in an attack or breach.

2. Inform Everyone Connected

The second step is to inform everyone connected of the breach or attack.

People who don’t know that there has been an attack on the system can put the system at a greater risk through the lack of knowledge.

Any employee who is connected to the system should disconnect immediately.
Advise employees to change their passwords with immediate effect.
Impose a no USB rule throughout the company in the event of a breach; this makes further cyber incidents less likely and stops the current one from spreading even further.
Advise employees to disconnect smartphones from any associated company files or accounts. Like fewer flash drives in company computersit stops potential ransomware from spreading.

 

3. Secure All Systems

Immediately secure all systems, including servers, email servers, and computer systems.

Do not submit to ransomware attacks. Instead, advise employees to never agree with an attacker’s demands but focus on heightened device security both at home and work.
Company systems can be secured with a professional cybersecurity team, which is strongly advised.

Laptop with padlock and security concept from lines, triangles and particle style design. Illustration vector
Access control and cyber security concept. Padlocks and locks on virtual digital screen. Data and information protection protocol. Secure connection.

4. Find Professional Help

All companies, especially small ones, should have a third-party online security provider. Discuss the cyber incident response plan with your security provider ahead of time – and make sure they know what to do in the event of an attack.

Larger companies are advised to allocate a cybersecurity department that constantly assesses and negates the company’s risk.

 

5. Inform the Authorities

A company should always inform the authorities in the event of a data breach or attack. But unfortunately, law enforcement is far from powerless in finding and prosecuting ransomware attackers.

Purporting a cyberattack is still against the law, and it can be part of a company’s response strategy. Law enforcement action can allow a faster, safer resolution.

Wondering what to do now?

If you want to find out more or contact us press one of the buttons to the right.

Other Posts in this Category

More About BEC Campaigns and How You Can Stop Them?

More About BEC Campaigns and How You Can Stop Them?

In this insight, we look at what BEC campaigns are, their characteristics, and what businesses can do to protect themselves

Am I Being Tracked Online?

Am I Being Tracked Online?

In this article, we look at the many different ways we are being tracked online, plus which measures users can

A 5-Step Guide to Changing your IT Support Provider for your Business

A 5-Step Guide to Changing your IT Support Provider for your Business

This article outlines the key areas to cover when changing IT providers. Here is a 5-Step Guide to Changing your

How Secure Is Your IT in Your Business?

How Secure Is Your IT in Your Business?

Want to know how secure your IT for your business? Learn more about the three items you need to enforce

Collaboration on Excel is Now Easier

Collaboration on Excel is Now Easier

Collaboration on Excel is Now Easier and what could this mean for your business? We have the answers that you

3 Ways Your MSP Can Help You Forecast Next Year’s IT Costs

3 Ways Your MSP Can Help You Forecast Next Year’s IT Costs

What are 3 ways your MSP can help you forecast next year's it costs? We have the answers you need!