Nex-Tech Blog | Technology Tips and Tricks | Industry News

You’ve Been Compromised – What Now?

Posted by Olga Detrixhe on Feb 25, 2019 2:09:27 PM

For most of us, these words still seem to sound like a Tom Clancy novel, but the cybercrime landscape is rapidly making them a reality, with more examples from our direct environment added to the storybook every week. 

OlgaCompromisedYet, most security measures are still highly focused on keeping the bad guys out. If people do any penetration tests, etc., they usually just check to see if someone can get in – not how far or how long they have gone unnoticed. The point is to figure out the weak spots in your wall and fix them. While all of that is valid and important, it is no longer enough. The reality has shifted, but our actions, priorities and budgets have not (yet). The IT community has accepted the inevitability of a breach. Yup, you read correctly – the inevitability of a breach! That means that it is generally accepted now that every business will experience a security breach at some point, whether that is information leaking, good old phishing finding a hook, or a successful malware attack. While firewalls, antivirus, and spam filters are still important, it is time to consider and plan for another bucket – the “what now?” bucket. This used to be the “what if” and was easily neglected as the risk for your average Kansas business was still fairly small, especially considering the time, money and resources cybersecurity takes. However, as that scale is tipping, the risk will eventually outnumber the investment for your business. Don’t wait and learn those lessons the hard way, start planning now to put you in the best situation possible.  Here are 4 things you can do today, most of which don’t require any investment, other than your time and energy:

  • Appoint a cybersecurity officer. It does NOT have to be the tech guy. Instead, it needs to be someone who is familiar with your response plan and has authorization to start the process in case of a breach.
  • Create an incident response plan. Around here, most people probably have an emergency plan for weather, e.g. tornado warnings. Treat cybersecurity no different and create a plan with clear steps to follow. Depending on the size of your organization, you may need professional help with that – talk to your trusted IT resource.
  • Find an IT partner you trust and start having conversations about what level of preparation is right for your business. It can be fairly simple to start with and scale up all the way to having proper policies and procedures.
  • Consider adding a “Detect and Response”-type solution to your security strategy. Most breaches go unrecognized for months, accumulating information and multiplying the damage caused to the business. A good solution will detect breaches faster and initiate mitigation, so impact to the business can be kept at a minimum.

 

The cybersecurity landscape is definitely ever changing. If you are ready to take action for your business, give us a call and we will be happy to assist.

Topics: Business Technology Watch, Cybersecurity, Security