Skip to content

Cyber Incident Response Plan Final

3D rendering. Abstract background concept of cyber security and attack, system crash.

What You Should Include in a Cyber Incident Response Plan

Data breaches or ransomware attacks are a scary reality for any small to medium enterprise. If you operate on the grid (or store your information on the cloud), your whole company could be at risk of a cyber incident at all times.

Statistics estimate that the average company could be affected by a virtual attack on its systems every 5 seconds. This figure might even be an underestimation of the actual danger.

The importance of a cyber incident response plan is to protect your company, your employees and your customers in the event of an attack.

Here are 5 things to do if your company is affected by a ransomware attack or data breach.

 

1. Escalate the Issue

The first thing anyone in the company should do in the event of a ransomware attack or data breach is to escalate the issue to the correct department. Stop using linked, active systems immediately, and inform the appropriate company sector that you suspect there has been an attack or breach on the system.

This allows for quick damage control and immediate action in an attack or breach.

2. Inform Everyone Connected

The second step is to inform everyone connected of the breach or attack.

People who don’t know that there has been an attack on the system can put the system at a greater risk through the lack of knowledge.

Any employee who is connected to the system should disconnect immediately.
Advise employees to change their passwords with immediate effect.
Impose a no USB rule throughout the company in the event of a breach; this makes further cyber incidents less likely and stops the current one from spreading even further.
Advise employees to disconnect smartphones from any associated company files or accounts. Like fewer flash drives in company computersit stops potential ransomware from spreading.

 

3. Secure All Systems

Immediately secure all systems, including servers, email servers, and computer systems.

Do not submit to ransomware attacks. Instead, advise employees to never agree with an attacker’s demands but focus on heightened device security both at home and work.
Company systems can be secured with a professional cybersecurity team, which is strongly advised.

Laptop with padlock and security concept from lines, triangles and particle style design. Illustration vector
Access control and cyber security concept. Padlocks and locks on virtual digital screen. Data and information protection protocol. Secure connection.

4. Find Professional Help

All companies, especially small ones, should have a third-party online security provider. Discuss the cyber incident response plan with your security provider ahead of time – and make sure they know what to do in the event of an attack.

Larger companies are advised to allocate a cybersecurity department that constantly assesses and negates the company’s risk.

 

5. Inform the Authorities

A company should always inform the authorities in the event of a data breach or attack. But unfortunately, law enforcement is far from powerless in finding and prosecuting ransomware attackers.

Purporting a cyberattack is still against the law, and it can be part of a company’s response strategy. Law enforcement action can allow a faster, safer resolution.

Wondering what to do now?

If you want to find out more or contact us press one of the buttons to the right.

Other Posts in this Category

Will Cathcart Vows to Protect WhatsApp Users’ Privacy Despite UK Online Safety Bill

Will Cathcart Vows to Protect WhatsApp Users’ Privacy Despite UK Online Safety Bill

Will Cathcart, the CEO of WhatsApp, recently made a stand against the UK’s Online Safety Bill.

Sustainable Search Engines: Understanding the Carbon Impact of LLMs

Sustainable Search Engines: Understanding the Carbon Impact of LLMs

Search engines are the pulse of the internet, providing quick and easy access to information.

Essential Guide to Setting Up SPF, DKIM and DMARC for Email Security

Essential Guide to Setting Up SPF, DKIM and DMARC for Email Security

Email authentication protocols are important tools that help protect your organisation against email spoofing.

Navigating the Tech Recession: How Tech Businesses Can Bounce Back and Move Forward

Navigating the Tech Recession: How Tech Businesses Can Bounce Back and Move Forward

Amidst reports of significant job cuts and temporary shutdowns, tech businesses are facing an unprecedented challenge.

“Exploring the Impact of Davos on Businesses and Technology”

“Exploring the Impact of Davos on Businesses and Technology”

The Davos Agenda is an annual event that takes place in the Swiss Alps, bringing together political and business leaders,

“40% Fall in Ransomware Earnings: How Increased Security Measures Are Impacting Cybercriminals”

“40% Fall in Ransomware Earnings: How Increased Security Measures Are Impacting Cybercriminals”

According to a recent report from blockchain data platform Chainanalysis, cybercriminals have seen a significant drop in their earnings due