Partner Perspectives  Connecting marketers to our tech communities.
SPONSORED BY
3/8/2017
11:30 AM
Malwarebytes Labs
Malwarebytes Labs
Partner Perspectives
50%
50%

4 Ways to Recover from a Cyberattack

Be prepared and act quickly are two key steps that will help you bounce back quickly from a cyberattack.

More companies are falling victim to cyberattacks, as a wide range of harmful software and social engineering schemes threaten to compromise the personal information and online safety of their clients. With cybercrime rates on the rise every year, it’s important for businesses of all sizes to have a recovery plan in place to mitigate any losses. In the unfortunate event of a data breach, these are the steps you should take to recover.

1.  Identify and contain the breach
On average, companies don’t know about data breaches or cyberattacks until at least 200 days after they’ve occurred. As soon as you become aware of a security incident, the first step is to identify and contain the problem, then document the following:

  • When it took place
  • How it will affect customers
  • What assets were affected
  • Who are the victims
  • The type of attack

To contain and remove the issue, your IT department should be ready to spring into action by separating sensitive data from the network, resetting all affected logins, reinstalling affected files, disconnecting affected hosts, removing files installed by the attack, and applying security patches, if necessary.

2. Inform your customers promptly
Large companies don’t have a history of a responding to cyberattacks in a timely manner. While they react quickly to contain the breach, it is often months before they address the general public, or even those impacted by the incident. This can lead to class-action lawsuits, marred reputations, and the exodus of massive amounts of customers.

The solution is to ensure that you have a response plan ready long before any cybercrime has occurred. Liaise with your public relations and marketing departments to prepare communications that you can issue in the event of a data breach, including information about compensation and any steps you’re taking to prevent future security incidents, such as implementing new cybersecurity protocols. When the time comes to distribute this information, involve your IT team to fill in the specific details.

3. Prevent future breaches
In the event of a data breach, it is important that you have the right professionals on board to help your business recover. According to IBM, enlisting the help of cybersecurity experts, including a chief information security officer, business manager, and incident response teams, can save millions in your company’s efforts to contain a data breach and respond to the affected parties.

Companies can also lower their defense costs by investing in online security technologies. Research by Ponemon Institute found that security intelligence systems saved companies an average of $3.7 million while encryption technology saved companies $1.4 million per year. Using advanced firewalls saved them $2.5 million.

4. Tighten up your legal defense
After having information compromised by a data breach, it is not uncommon for customers to sue the company responsible. With Yahoo facing a class-action lawsuit in the wake of its recent data breach that affected over 500 million accounts, it is important for companies to prepare for the fact that they may be taken to court for allowing a hacker access to their customers’ personal information.

The Department of Justice advises business owners to form a relationship with local law enforcement before cyber incidents occur. This establishes a point-of-contact in the event of a data breach to whom you can report the crime.

Legal counsel should also be retained before any cybercrimes have the chance to are  committed. Business managers should ensure that their legal team has experience with cyber incident management, including the knowledge to guide you when reporting the breach to customers, and navigating liability for taking corrective measures.

Companies should also proactive measures to prevent cyberattacks from happening in the first place. Being prepared and acting quickly are vital to helping your company recover from a cyberattack as effectively as possible.

For more in-depth advice on how to recover from a cyberattack, read the full article on Malwarebytes Labs.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Election Websites, Back-End Systems Most at Risk of Cyberattack in Midterms
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/14/2018
Intel Reveals New Spectre-Like Vulnerability
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/15/2018
Australian Teen Hacked Apple Network
Dark Reading Staff 8/17/2018
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
Malwarebytes protects businesses against malicious threats that escape detection by traditional antivirus solutions. Malwarebytes Anti-Malware, the companys flagship product, has a highly advanced heuristic detection engine that has removed more than five billion malicious threats from computers worldwide. SMBs and enterprise businesses worldwide trust Malwarebytes to protect their data. Founded in 2008, the company is headquartered in California with offices in Europe, and a global team of researchers and experts. For more information, please visit us at www.malwarebytes.com/business.
Featured Writers
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15504
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. The server mishandles some HTTP request fields associated with time, which results in a NULL pointer dereference, as demonstrated by If-Modified-Since or If-Unmodified-Since with a month greater than 11.
CVE-2018-15505
PUBLISHED: 2018-08-18
An issue was discovered in Embedthis GoAhead before 4.0.1 and Appweb before 7.0.2. An HTTP POST request with a specially crafted "Host" header field may cause a NULL pointer dereference and thus cause a denial of service, as demonstrated by the lack of a trailing ']' character in an IPv6 a...
CVE-2018-15492
PUBLISHED: 2018-08-18
A vulnerability in the lservnt.exe component of Sentinel License Manager version 8.5.3.35 (fixed in 8.5.3.2403) causes UDP amplification.
CVE-2018-15494
PUBLISHED: 2018-08-18
In Dojo Toolkit before 1.14, there is unescaped string injection in dojox/Grid/DataGrid.
CVE-2018-15495
PUBLISHED: 2018-08-18
/filemanager/upload.php in Responsive FileManager before 9.13.3 allows Directory Traversal and SSRF because the url parameter is used directly in a curl_exec call, as demonstrated by a file:///etc/passwd value.