<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=290086984736480&amp;ev=PageView&amp;noscript=1">
word-map-thumb

The Alternative Board Blog

5 Tips for Recovering from a Cyber Attack

Aug. 9, 2017 | Posted by The Alternative Board Worldwide
bigstock--186356185

Small businesses are increasingly aware that cyber crime can strike any enterprise, not just Fortune 500 companies. This realization comes not a moment too soon, since various studies estimate that nearly 50% of cyber attacks specifically target small businesses to achieve their nefarious objectives.

Why? Cyber security expert Joseph Steinberg points to several alarming factors:

  • Small businesses are considered more likely to give in to ransomware and pay hackers to restore urgently needed data.
  • Small businesses that regularly work with larger companies may be “a hacker’s golden ticket into a larger enterprise.”
  • Many small businesses lack a sophisticated line of cyber-defense.

Your business should take steps to guard against data theft, but even so, there’s no such thing as 100%-guaranteed protection. So, what happens if and when a cyber attack occurs? Here are five mission-critical steps to keep in mind:

1. Fall back on your contingency plan. Your best defense lies in crafting a comprehensive assessment of your IT system’s strengths and weaknesses before a cyber crime occurs. A thorough evaluation (not conducted during a time of crisis) can objectively determine where and how a malicious virus or hacker can breach your defenses. Encourage your IT team to brainstorm every possible contingency and come up with an action plan to protect against them.

2. Ascertain the extent of the damage. The first step following a verified cyber attack is assessing the extent of damage to your system. Get your IT team—or a trusted third-party vendor—to scour the system and isolate any infected areas. Analyze incident data. Determine if internal security protocols were adhered to and, if not, pinpoint where the breakdown took place.

Also, as part of the assessment process, be prepared to enlist third-party expertise “to help handle and mitigate the fallout,” says data protection expert Ermis Sfakiyanudis. This includes “legal counsel [and] outside investigators who can conduct a thorough forensic investigation” that definitively details how much damage has taken place.

3. Validate the integrity of your data backup. Since many cyber attacks take the form of encrypting precious data and rendering it inaccessible to you and your business, it’s critically important to have redundant data storage systems up and running at all times. These redundant servers and ancillary equipment must be maintained apart from your primary system, to protect against “collateral damage” from a virus or malware.

4. Repair the damage. If and when an attack does occur, “it’s time to begin the restoration process,” advises IT security specialist Andrew Douthwaite. Reformat hard drive volumes. Reinstall operating systems and applications. Adds Douthwaite: “After the breach it's vital that you verify your backups are good.”

5. Notify constituencies about the cyber attack without evasion or ambiguity. Virtually all IT security experts agree on the importance of communicating with various constituencies in a clear, forthright manner. To employees, customers, vendors and—if necessary—the media, you should share as many details of the incident as appropriate and outline the actions you’ve taken to repair the damage and ensure against future attacks.

Any executive’s initial impulse might be to deny or mitigate the truth, but remember—the integrity of your brand is at stake. Attempting to misstate or spin what happened in a way you think may bolster your image is extremely risky. A certain amount of consumer trust is lost when news breaks of a successful cyber attack; if customers or employees or the media then suspect you’re covering up what happened, more trust will be lost, possibly forever.

Planning for the worst is the most effective strategy. As part of that effort, revisit your crisis plan at regular intervals, recognizing that technology (and company personnel) keep changing as well.

To try and keep yourself from being a target for a cyber criminal in the first place, register to watch our BOSS Webinar about Why Small Businesses are a Cyber Criminal’s Favorite Target, at 10 a.m. (MDT) Wednesday, August 16, 2017.

Read our 19 Reasons You Need a Business Owner Advisory Board

DOWNLOAD

Written by The Alternative Board Worldwide

Related posts

How to Manage Your Mobile Workforce

Jul. 16, 2018 | Posted by The Alternative Board Worldwide
The American workforce is changing the nature of “work” as we once knew it. The days when employees absolutely had to work at a desk, in an office, are long gone. While many businesses still insist...

What Technology Is Best for Driving Growth?

Apr. 9, 2018 | Posted by The Alternative Board Worldwide
 Advances in technology have significantly leveled the playing field for small and mid-sized businesses. They now have access to much of the same technological resources previously available only to...

How Technology Can Boost Your New Employee Recruitment Efforts

Apr. 9, 2018 | Posted by The Alternative Board Worldwide
Gone are the days of job-seekers finding jobs in a newspaper’s classified section. Even online job boards aren’t as effective as they once were. To be competitive in today’s marketplace, businesses...

4 Warning Signs It’s Time to Upgrade Your Technology

Apr. 9, 2018 | Posted by The Alternative Board Worldwide
 Digital and mobile technology have become essential for the effective operation of virtually every business. But precisely what technology your small business needs depends on a wide range of...

Use Technology to Enhance Your Employee Communications Efforts

Mar. 5, 2018 | Posted by The Alternative Board Worldwide
If improving communications with your employees was on your 2018 list of resolutions, there are many ways to leverage digital technology to achieve this goal. Businesses that still rely on a...

Leverage Technology to Strengthen Your Sales Culture

Aug. 30, 2017 | Posted by The Alternative Board Worldwide
Anyone involved in sales will likely agree that conventional sales processes of the past—even the recent past—are giving way to a new order. The newer approach leverages the use of digital...

Why Optimizing Your Website is Good for Business

Aug. 16, 2017 | Posted by The Alternative Board Worldwide
A sizeable percentage of your customer base is already using their mobile devices to purchase your products or services. In all likelihood, given current statistics, this percentage will grow...

How to Embrace Changing Technology

Aug. 1, 2017 | Posted by The Alternative Board Worldwide
We all know technology is changing at warp speed, so it’s easy for small businesses to feel they can’t keep up—or worse, to feel too intimidated to even try to do so. There’s also the concern that...

The Perfect Business Conference Playlist

Jun. 11, 2015 | Posted by The Alternative Board Worldwide
One of my favorite parts of planning our annual Facilitator Conference is selecting the music. We want the music to be upbeat. Create energy. Selecting the right music can be tricky. Just like good...

Media Training – because you only get one chance to make an impression

Sep. 25, 2013 | Posted by The Alternative Board Worldwide
Sharon Cain , a former on-screen Sky TV and BBC reporter, trains key spokespeople from the public and private sector on emotive issues spanning investment decisions, deaths, redundancies and...