Error
  • Error loading component: com_advancedmodules, 1

Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What to Do Before (And After) a Data Breach

What to Do Before (And After) a Data Breach

One of the biggest myths out there related to cybersecurity is that criminals only go after the big enterprises. Why should they care about your small operation, anyway? In reality, cybercriminals love to attack small businesses to take advantage of their weaker security infrastructures. If you’re not careful, this could lead to serious losses for your business stemming from a loss of trust, legal fees, and operational downtime.

Today, we’re going over what you should do before a data breach, as well as what to do afterward, so you can be as prepared as possible for cyberattacks.

What to Do Before a Data Breach

Develop an Incident Response Plan

If you want to be ready for a cyberattack, it starts by building a plan. You need to build an Incident Response Plan (IRP), a physical or digital document that details what happens in the event of a data breach. This includes resources beyond IT, including your legal counsel, any insurance providers, and your head of communications. With all this at your fingertips, you should be able to execute your plan in a second, should anything bad occur.

Implement the 3-2-1 Backup Rule

On the off-chance your business suffers a data breach, you'll want to have backups and restoration procedures in place. We recommend the 3-2-1 rule, where you maintain three copies of your data, on two different media types, with one off-site copy. Keep in mind this is the bare minimum of what you should accept; we also like to add in having an immutable backup that cannot be edited or changed, just for good measure.

What to Do After a Data Breach

Isolate the Affected Systems

Your first thought, in the event of a data breach, should be to contain the threat. Disconnect the device from the Internet and your physical infrastructure, but do not turn the computer off; experts will need to look at the device to see what the hackers were up to, and turning it off could erase vital evidence. Finally, disable remote access and shut down any VPNs or remote desktop protocols.

Conduct a Forensic Investigation

Now that your systems are isolated, it’s time to root out the cause of the breach and take action. We recommend you work with security professionals, like Voyage Technology, to find out how the attacker got in, like an unpatched software vulnerability or a phished password. If you work with us, we’ll also look for which specific files were accessed or exported, as well as how long the hacker was present on your systems and which accounts have been compromised.

Practice Transparency In Your Communication Strategy

A data breach is devastating in its own right, but it can be just as bad for your reputation if you try to cover it up. You need to effectively communicate to your clients and customers that you are not a liability due to your security breach. We recommend you follow a simple framework in your client-facing communication: start with what happened, explain what you are doing to address it, and what your clients should do in their own response.

Reset All Credentials Across the Organization

If a hacker makes it into your infrastructure, they’ll likely try to use a backdoor to break in again. Use the “nuclear” password option and force password changes across the organization, and be sure to log everyone out of all accounts and devices globally. Furthermore, enable multi-factor authentication for all accounts to prevent a secondary breach.

Is your business adequately protected from and prepared for a cyberattack? Voyage Technology can help you develop the appropriate response strategy, but hopefully it doesn’t come to that. Learn more today about how to minimize your risk by calling us at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Email Workplace Tips Google Computer Workplace Strategy Collaboration Backup Small Business Hosted Solutions Ransomware Users AI Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Facebook Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Vendor Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Two-factor Authentication Managed Services Apps Apple Networking App BYOD Mobile Device Management Gmail Voice over Internet Protocol WiFi Tip of the week Chrome Budget Employer-Employee Relationship Managed IT Services How To BDR Hacker HIPAA Avoiding Downtime Applications Marketing Computing Physical Security Information Technology Access Control Office 365 Conferencing Password Computers Router Operating System Website Virtual Private Network Risk Management 2FA Help Desk Health Analytics Office Tips Augmented Reality Healthcare Big Data Retail Storage Bring Your Own Device Windows 7 Customer Service Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Windows 11 Display Firewall Monitoring Printer Paperless Office Infrastructure Excel The Internet of Things Managed IT Service Remote Workers Document Management Telephone Social Scam Cooperation Free Resource Project Management Data loss Images 101 Administration Telephone System Multi-Factor Authentication Mobility Hacking Cost Management Presentation Robot Wireless Technology Settings Employees Printing Integration Wireless Content Filtering User Tip Modem IT Management VPN Mobile Security YouTube Meetings Processor Word Holidays Cryptocurrency Data Storage Computer Repair Smart Technology Supply Chain Video Conferencing Virtual Desktop Data storage Managed Services Provider LiFi Professional Services Safety Saving Time Virtual Machines Outlook Machine Learning Money Humor Downloads iPhone Licensing Maintenance Vulnerabilities Sports Entertainment Antivirus Mouse Data Privacy Customer Relationship Management Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Mobile Computing Gamification Flexibility Staff Value Business Intelligence Tablet Search Competition Organization Social Networking Best Practice Legislation Shortcuts Alert Ransmoware Buisness File Sharing Dark Data Fileless Malware Digital Security Cameras Smart Devices Managed IT Content Remote Working Legal Wearable Technology Memory Vendors IT solutions How To User Health IT Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Notifications Permissions Workforce Travel Directions Videos Assessment Electronic Health Records Techology Wasting Time Threats Google Maps Cortana IP Address Trend Micro Alt Codes Specifications Security Cameras Workplace Strategies Fraud Meta Downtime Unified Threat Management Microchip Internet Exlporer Software as a Service Username Unified Threat Management Managing Costs Amazon Hosted Solution Recovery eCommerce Typing Black Friday SSID Virtual Assistant Outsource IT Network Congestion Hard Drives Database Surveillance Google Drive User Error IT Technicians Virtual Machine Environment Media Knowledge Domains Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Point of Sale 5G Refrigeration Tactics Development Google Docs Mirgation Hypervisor Displays Unified Communications Experience Public Speaking Running Cable Tech Support Lithium-ion battery Shopping Nanotechnology Optimization Bitcoin Network Management PowerPoint Addiction Google Wallet Language Employer/Employee Relationships Outsourcing Monitors Entrepreneur Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Laptop Websites Gig Economy Screen Reader Windows 8 Service Level Agreement Internet Service Provider Drones Computing Infrastructure Teamwork Hiring/Firing Undo Regulations Compliance SharePoint Identity Evernote Paperless Electronic Medical Records Co-managed IT Halloween Bookmark Smart Tech Memes Download Net Neutrality Lenovo Alerts SQL Server Technology Care Writing Financial Data History Business Communications Virtual Reality Break Fix Scams Scary Stories Private Cloud Application Browsers Smartwatch Connectivity IT Hacks Server Management Upload Procurement Superfish Azure Hybrid Work Identity Theft Fun Social Network Telework Cyber security Deep Learning Multi-Factor Security Tech Human Resources Twitter IBM Dark Web Cables Error CES IoT Communitications Trends Supply Chain Management Education Social Engineering Customer Resource management FinTech Regulations Google Calendar Term Google Apps Remote Computing

Blog Archive