Five Steps to Take in the Aftermath of a Breach

Extract from article by Eileen McCooey

Data breaches and cyber-security incidents are becoming more complex and far-reaching, extending to every department in an organization. A swift, effective response is critical: Left unchecked, breaches can result in enterprise-wide damage that can affect a company’s stock price and customer confidence.

That’s the central message of the “2017 Verizon Data Breach Digest,” which draws from real-world cyber-investigations by Verizon’s RISK (Research, Investigations, Solutions and Knowledge) Team. The report identifies common scenarios and provides a detailed analysis of how each attack occurred, the tactics and techniques used, and recommended countermeasures.

Five Steps to Take in the Aftermath of a Breach

Verizon experts recommend that companies have a strategy in place before a breach actually occurs in order to recover as quickly as possible. To help minimize damage, organizations should be ready to take these five steps in the aftermath of a breach:

  • Preserve evidence and consider consequences of every action taken.
  • Be flexible and adapt to evolving situations.
  • Establish consistent methods for communication.
  • Know your limitations and collaborate with other key stakeholders.
  • Document actions and findings, and be prepared to explain them.