Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives  Connecting marketers to our tech communities.
SPONSORED BY
3/8/2017
11:30 AM
Malwarebytes Labs
Malwarebytes Labs
Partner Perspectives
50%
50%

4 Ways to Recover from a Cyberattack

Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

More companies are falling victim to cyberattacks, as a wide range of harmful software and social engineering schemes threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the rise every year, it’s important for businesses of all sizes to have a recovery plan in place to mitigate any losses. In the unfortunate event of a data breach, these are the steps you should take to recover.

1.  Identify and contain the breach
On average, companies don’t know about data breaches or cyberattacks until at least 200 days after they’ve occurred. As soon as you become aware of a security incident, the first step is to identify and contain the problem, then document the following:

  • When it took place
  • How it will affect customers
  • What assets were affected
  • Who are the victims
  • The type of attack

To contain and remove the issue, your IT department should be ready to spring into action by separating sensitive data from the network, resetting all affected logins, reinstalling affected files, disconnecting affected hosts, removing files installed by the attack, and applying security patches, if necessary.

2. Inform your customers promptly
Large companies don’t have a history of a responding to cyberattacks in a timely manner. While they react quickly to contain the breach, it is often months before they address the general public, or even those impacted by the incident. This can lead to class-action lawsuits, marred reputations, and the exodus of massive amounts of customers.

The solution is to ensure that you have a response plan ready long before any cybercrime has occurred. Liaise with your public relations and marketing departments to prepare communications that you can issue in the event of a data breach, including information about compensation and any steps you’re taking to prevent future security incidents, such as implementing new cybersecurity protocols. When the time comes to distribute this information, involve your IT team to fill in the specific details.

3. Prevent future breaches
In the event of a data breach, it is important that you have the right professionals on board to help your business recover. According to IBM, enlisting the help of cybersecurity experts, including a chief information security officer, business manager, and incident response teams, can save millions in your company’s efforts to contain a data breach and respond to the affected parties.

Companies can also lower their defense costs by investing in online security technologies. Research by Ponemon Institute found that security intelligence systems saved companies an average of $3.7 million while encryption technology saved companies $1.4 million per year. Using advanced firewalls saved them $2.5 million.

4. Tighten up your legal defense
After having information compromised by a data breach, it is not uncommon for customers to sue the company responsible. With Yahoo facing a class-action lawsuit in the wake of its recent data breach that affected over 500 million accounts, it is important for companies to prepare for the fact that they may be taken to court for allowing a hacker access to their customers’ personal information.

The Department of Justice advises business owners to form a relationship with local law enforcement before cyber incidents occur. This establishes a point-of-contact in the event of a data breach to whom you can report the crime.

Legal counsel should also be retained before any cybercrimes have the chance to are  committed. Business managers should ensure that their legal team has experience with cyber incident management, including the knowledge to guide you when reporting the breach to customers, and navigating liability for taking corrective measures.

Companies should also proactive measures to prevent cyberattacks from happening in the first place. Being prepared and acting quickly are vital to helping your company recover from a cyberattack as effectively as possible.

For more in-depth advice on how to recover from a cyberattack, read the full article on Malwarebytes Labs.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .