What To Do When Your Company Network Is Hacked
Legacy signals
Legacy popularity: 1,511 legacy views
I have written many articles and blogs warning about the cost to a company from a security breach.
Ben Worthen, a staff reporter in The Wall Street journal’s San Francisco bureau, wrote a great article “What to Do if You’ve Been Hacked” on September 26, 2011, where he has highlighted some key things to do. All the points are excellent but the #1 “to do” is to not ignore the attack and hope it goes away. It won’t!
Here is some advice if your company network has been hacked:
Don’t unplug the affected computer because it can erase key evidence stored in computer memory and not on a hard drive, but do disconnect the it from the network.
Call in post-breach forensic security experts for the investigation as soon as you discover the attack. If your IT people, police, etc. are not properly trained key evidence can be destroyed.
Maintain a chain of custody to show you are following appropriate procedures in dealing with the breach. This can help with both legal issues and privacy protection compliance issues.
Determine if the breach has infected other computers and other servers. Again the pros will have to do this.
Remove the infection by cleaning all data, updating all anti-malware programs and maybe even scrubbing the computer’s hard drive and re-installing the OS and apps from scratch.
Determine how many data files were affected. The last thing a company wants to do is report a breach that then has to be modified up or down.
Determine who to tell and how can be as devastating to a company as trying to figure out how the breach occurred in the first place. With forty-six different state laws, numerous federal laws, and figuring out which ones apply also requires specialists.
Finally, apologize to your customers. Make them feel that they are important and your respect their privacy. Otherwise you risk lost customers, wasted money to acquire customer in the first place and law suits.
With just these eight points you should start to understand why the average cost to a company from a data breach is now at $7.2 million per incident. While there is no way to guarantee that a company will not experience an attack, just a few simple tasks will help:
Know the four points of vulnerability; Building, employee, computer and network.
Bring in a security analysis team to evaluate all these points of vulnerabilitiesr
Develop a plan ahead of time on how to respond to a breach. Companies practice fire drills why not data breach drills.
Train your employees about security and what to watch out for. Hey it’s their jobs too on the line.
Buying breach insurance is important, but to qualify the company has to have first put in place security and had completed a security analysis.
With so many ways customers personal information can be compromised, the best a company can do is to place enough barriers to makes thieves look for easier prey.
Article author
About the Author
Dovell Bonnett has been creating security solutions for computer users for over 20 years. In order to provide these solutions to consumers as directly, and quickly, as possible, he founded Access Smart. With each of his innovations, the end user — the person sitting in front of a computer — is his No. 1 customer.
This passion, as he puts it, to “empower people to manage digital information in the digital age” also led him to write the popular Online Identity Theft Protection for Dummies. Within the pervasive nature of our e-commerce and e-business community, personal information, from credit card numbers to your pet’s name, is more easily accessed, and identity theft and fraud has become an issue that touches every consumer.
Further reading
Further Reading
Article
Students Beware! Identity thieves are studying you!
It is probably no surprise to most adults that identity theft is one of the fastest growing types of fraud. But what may be more alarming is that people in the 18 to 29 age range are the fastest growing group of victims. One need not look too far to figure out why. Today’s young people ...
Related piece
Article
Things to consider when trying to get out of debt!
On a daily basis, consumers are barraged by offerings from companies claiming they can turn their dismal credit histories around and help them achieve higher credit scores. For a fee, they promise to clean up a consumer’s credit report so they can obtain a car loan, a home mortgage or ...
Related piece
Article
Passwords Don't Have to Threaten Business Security
The emergence of the World Wide Web as a global, around the clock marketplace has opened a multitude of new opportunities to businesses which have never before been seen. Computers and global communication networks have brought vendors, customers and markets together in new and beneficial ways. Along with all of the benefits which business has gained from the information age come some downsides. New crimes have not been created by new technology, but rather new technology has given new tools to criminals to commit the same crimes as they always have.
Related piece
Article
5 Mistakes to Avoid when Dealing with a Debt Collector
Dealing with a collection agency can be a stressful experience. Not only are some debt collectors rude, but endless demanding telephone calls and letters can shake even the toughest individual. The stress and confusion that debt collectors can cause often results in consumers making mistakes that can result in future financial or legal difficulties. Here are 5 mistakes to avoid when dealing with a debt collector; 1. Conducting Business over the Telephoner
Related piece