Skip to main content

You’ve Been Attacked. Now What?

Network Attack

Now What?

The five steps you take in the first 48 hours after a breach will go a long way towards minimizing your organization’s exposure and liability.

Responding to an incident requires careful orchestration. You have to assemble a cross-functional response team, conduct forensic analysis, control communications, implement timely containment, and aggressively expel the attacker from your network. At the same time you need to incorporate advice and guidance from outside legal counsel and law enforcement, intelligence from regulators, and provisos from insurance providers.

We recently worked with a large organization that was put to the test when it experienced an attack by an advanced persistent threat actor. As always, speed was critical.  Here’s what happened in the initial 48 hours. The team:

  1. Engaged outside legal counsel skilled in cybersecurity incidents. Having legal counsel enables an outside consultant to operate under attorney-client privilege, which protects internal communications and accelerates a company’s ability to resolve the incident. In this case, our IR team also served as a cybersecurity advisor to legal counsel at executive and board meetings.
  2. Involved the local FBI office at the start of the investigation. The FBI reciprocated by providing potentially related artifacts, which originated at other organizations, so the company could search for them during the investigation. Although we didn’t find any of the artifacts in the client’s environment, the spirit of information-sharing was helpful. The company in turn shared all of the artifacts from its investigation with the FBI.
  3. Alerted industry regulators and performed disclosures to comply with multiple regulatory obligations. To offset the negative news, the company directly notified customers, employees and law enforcement organizations about the breach and the status of remediative actions that were underway.
  4. Developed a communication strategy. The IR team hired outside crisis communications agencies to craft messaging to defuse speculation and control the spread of inaccurate news. Team leaders directed internal and external legal counsels to review all communications related to the incident, mobilized the communications team to handle internal communications, and engaged an external crisis-communication firm to compose messages that carried the proper tone and minimized potential misunderstandings.
  5. Notified the insurance provider. Once it was determined that data was actually stolen, the organization began a discussion about insurance coverage to determine what costs would or would not be covered.

Are your systems optimized for maximum speed and performance? (I can tell you, 99% of the computer networks we review are NOT.

Call Group 4 Networks your IT Support provider from Toronto to help you with all your IT needs.