Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Organisations need to get prepared: three steps for dealing with a data breach

by The Gurus
August 24, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

The numerous data breaches that have hit the media headlines over the past few years demonstrate how imperative it is that every organisation creates a detailed action plan in the event that a hacker is able to infiltrate their system and steal a treasure trove of data. What’s more, cyber threats are evolving, fast, as criminal gangs embark upon increasingly targeted attacks, from social engineering to exploring the dark web for company specific information, to even placing rogue individuals into an organisation as employees.
There are multiple tools available to organisations today to keep them safe from the hackers. However, for those organisations that don’t have the correct measures in place, dealing with the aftermath of an attack is essential. As such, Stuart Poole-Robb, Chief Executive of Business Intelligence and Security Adviser, KCS Group Europe, gives three steps to take to recover from a data breach if the worst should happen.

  1. Identify the source of the breach

The first step that organisations need to take is to identify the source of the breach. Gaining advice from an external source is essential here, as it is likely that the missing links in the cyber security strategy were already over looked by in house-IT and/or existing consultants. A fresh pair of eyes is therefore needed to examine the situation from all angles.

  1. Assess the extent of the damage  

After the source of the breach has been detected, the next step is to assess the full extent of the damage; has more data been compromised than initially realised? A full search on the Dark Web using embedded sources often reveals not only how much of the company’s sensitive data is already for sale to the highest bidder but also data that was leaked or stolen in previous unrecognised breaches. A full forensic search is now required internally on the compromised systems, ideally with the aid of products that can inspect logs and trace the start of the breach.

  1. Strengthen IT security defences

Finally, organisations need to strengthen the IT defences currently in place and safeguard against future attacks. Organisations need to fight intelligence with intelligence.  Are employees trustworthy – and if so, are they switched on to the risks associated with social networks? Are potential business partners, suppliers and investors who they appear to be? Is a competitor looking to cause reputational damage? Or is a specific company weakness being discussed or traded on the dark web? From penetration tests to demonstrate employees’ vulnerability to social engineering to dark web vulnerability reports and thorough background checks, by fusing intelligence led security measures with existing security tools and processes, organisations change the game.
Conclusion
Cyber hackers no longer operate only online; they increasingly exploit ‘traditional’ criminal skills in person to bypass cyber security procedures and gain specific insight into a corporation and its employees.  And they invest huge amounts of time and resources to target specific organisations, for a range of objectives.
There is simply no way that the cyber security tools currently deployed can fight this form of targeted attack. It is only by fusing intelligence led security that delivers insight into specific risks with the right security tools and processes that organisations can start to fight back. And the fact remains that in this age of such sophisticated hackers, a post-breach action plan is essential. Without a plan, the alternative could be disastrous: careers would be on the line, shareholders would be furious and clients would be disgruntled. No organisation should take the chance.

FacebookTweetLinkedIn
ShareTweet
Previous Post

Poor security 'aided' Ashley Madison hack

Next Post

Asian companies have world's worst cybersecurity says study

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information