<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=349935452247528&amp;ev=PageView&amp;noscript=1">
Search
word-map-thumb

The Alternative Board Blog

5 Tips for Recovering from a Cyber Attack on Your Business

Aug. 9, 2017 | Posted by The Alternative Board
bigstock--186356185

Small businesses are increasingly aware that cyber crime can strike any enterprise, not just Fortune 500 companies. This realization comes not a moment too soon, since various studies estimate that nearly 50% of cyber attacks specifically target small businesses to achieve their nefarious objectives.

Why? Cyber security expert Joseph Steinberg points to several alarming factors:

  • Small businesses are considered more likely to give in to ransomware and pay hackers to restore urgently needed data.
  • Small businesses that regularly work with larger companies may be “a hacker’s golden ticket into a larger enterprise.”
  • Many small businesses lack a sophisticated line of cyber-defense.

Your business should take steps to guard against data theft, but even so, there’s no such thing as 100%-guaranteed protection. So, what happens if and when a cyber attack occurs? Here are five mission-critical steps to keep in mind:

1. Fall back on your contingency plan. Your best defense lies in crafting a comprehensive assessment of your IT system’s strengths and weaknesses before a cyber crime occurs. A thorough evaluation (not conducted during a time of crisis) can objectively determine where and how a malicious virus or hacker can breach your defenses. Encourage your IT team to brainstorm every possible contingency and come up with an action plan to protect against them.

2. Ascertain the extent of the damage. The first step following a verified cyber attack is assessing the extent of damage to your system. Get your IT team—or a trusted third-party vendor—to scour the system and isolate any infected areas. Analyze incident data. Determine if internal security protocols were adhered to and, if not, pinpoint where the breakdown took place.

Also, as part of the assessment process, be prepared to enlist third-party expertise “to help handle and mitigate the fallout,” says data protection expert Ermis Sfakiyanudis. This includes “legal counsel [and] outside investigators who can conduct a thorough forensic investigation” that definitively details how much damage has taken place.

Want additional insight? Download Hiring a Business Coach for Your Small Business now 

DOWNLOAD

3. Validate the integrity of your data backup. Since many cyber attacks take the form of encrypting precious data and rendering it inaccessible to you and your business, it’s critically important to have redundant data storage systems up and running at all times. These redundant servers and ancillary equipment must be maintained apart from your primary system, to protect against “collateral damage” from a virus or malware.

4. Repair the damage. If and when an attack does occur, “it’s time to begin the restoration process,” advises IT security specialist Andrew Douthwaite. Reformat hard drive volumes. Reinstall operating systems and applications. Adds Douthwaite: “After the breach it's vital that you verify your backups are good.”

5. Notify constituencies about the cyber attack without evasion or ambiguity. Virtually all IT security experts agree on the importance of communicating with various constituencies in a clear, forthright manner. To employees, customers, vendors and—if necessary—the media, you should share as many details of the incident as appropriate and outline the actions you’ve taken to repair the damage and ensure against future attacks.

Any executive’s initial impulse might be to deny or mitigate the truth, but remember—the integrity of your brand is at stake. Attempting to misstate or spin what happened in a way you think may bolster your image is extremely risky. A certain amount of consumer trust is lost when news breaks of a successful cyber attack; if customers or employees or the media then suspect you’re covering up what happened, more trust will be lost, possibly forever.

Planning for the worst is the most effective strategy. As part of that effort, revisit your crisis plan at regular intervals, recognizing that technology (and company personnel) keep changing as well.

To try and keep yourself from being a target for a cyber criminal in the first place, register to watch our BOSS Webinar about Why Small Businesses are a Cyber Criminal’s Favorite Target, at 10 a.m. (MDT) Wednesday, August 16, 2017.

Read our 19 Reasons You Need a Business Owner Advisory Board

DOWNLOAD

Written by The Alternative Board

Related posts

3 Technology Hacks to Improve Workplace Productivity
Aug. 31, 2021 | Posted by The Alternative Board
Ironically, technology enables us to get our work done anywhere and become more productive but also takes us down many time-wasting activities and paths. When we are on our devices, it is easy to get...
5 Productivity Hacks for Busy CEOs and Business Owners
Aug. 24, 2021 | Posted by The Alternative Board
It’s too bad there are only 24 hours in a day. Think what you could get accomplished if you had twice that time! Still, effective business leaders know how to make the most of their precious time....
5 Ways To Tell When Your Business Needs a System Overhaul
Aug. 17, 2021 | Posted by The Alternative Board
We all know that businesses need to accomplish many tasks each day for their companies to function. And they need to complete those tasks efficiently, smoothly, and quickly to thrive. As an...
How Technology Can Help Increase Productivity
Jun. 2, 2021 | Posted by Phil Spensieri
If you’ve been running a successful business the same way for a number of years, you may be a bit hesitant to implement change, especially when it comes to technology. For some, technology can be...
5 Tips for More Effective Meetings, Virtual and Otherwise
May. 27, 2021 | Posted by The Alternative Board
Among many things the COVID-19 pandemic changed in the world, the concept of business meetings has undergone a dramatic transformation. For many businesses, meetings that take place on Zoom or other...
How to Build Employee Culture with a Remote Team
Apr. 6, 2021 | Posted by Phil Spensieri
Whether your staff have been working from home for the past year or rotating between home and the office, there is no doubt that for most of us there has been a change in our working environment....
12 Ways to Make Virtual Meetings More Effective
Mar. 30, 2021 | Posted by The Alternative Board
In today's workplace, you are highly likely to work with a team across the country (or even across the world). Therefore, a good understanding of making remote meetings work for you and your team is...
Tips on Going Paperless in 2021
Mar. 11, 2021 | Posted by The Alternative Board
Businesses seeking to economize, as the world slowly recovers from the COVID-19 pandemic, should take a close look at going completely paperless in the workplace. Is this really a worthwhile goal?...
How a Smartphone (and Some Great Apps) Can Help Your Business
Mar. 4, 2021 | Posted by The Alternative Board
Virtually everyone owns a smartphone, which we use for an ever-growing array of tasks and entertainment. But smartphones are also extremely useful in the business realm. CEOs and business owners are...
11 Top Business Apps Every Business Owner Should Have
Feb. 25, 2021 | Posted by The Alternative Board
As an entrepreneur, you handle an onslaught of tasks day in and day out. You are often juggling a multitude of jobs. Competing priorities make being organized and focused on the end goal even more...