<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=290086984736480&amp;ev=PageView&amp;noscript=1">

The Alternative Board Blog

5 Tips for Recovering from a Cyber Attack on Your Business

Aug. 9, 2017 | Posted by The Alternative Board

Small businesses are increasingly aware that cyber crime can strike any enterprise, not just Fortune 500 companies. This realization comes not a moment too soon, since various studies estimate that nearly 50% of cyber attacks specifically target small businesses to achieve their nefarious objectives.

Why? Cyber security expert Joseph Steinberg points to several alarming factors:

  • Small businesses are considered more likely to give in to ransomware and pay hackers to restore urgently needed data.
  • Small businesses that regularly work with larger companies may be “a hacker’s golden ticket into a larger enterprise.”
  • Many small businesses lack a sophisticated line of cyber-defense.

Your business should take steps to guard against data theft, but even so, there’s no such thing as 100%-guaranteed protection. So, what happens if and when a cyber attack occurs? Here are five mission-critical steps to keep in mind:

1. Fall back on your contingency plan. Your best defense lies in crafting a comprehensive assessment of your IT system’s strengths and weaknesses before a cyber crime occurs. A thorough evaluation (not conducted during a time of crisis) can objectively determine where and how a malicious virus or hacker can breach your defenses. Encourage your IT team to brainstorm every possible contingency and come up with an action plan to protect against them.

2. Ascertain the extent of the damage. The first step following a verified cyber attack is assessing the extent of damage to your system. Get your IT team—or a trusted third-party vendor—to scour the system and isolate any infected areas. Analyze incident data. Determine if internal security protocols were adhered to and, if not, pinpoint where the breakdown took place.

Also, as part of the assessment process, be prepared to enlist third-party expertise “to help handle and mitigate the fallout,” says data protection expert Ermis Sfakiyanudis. This includes “legal counsel [and] outside investigators who can conduct a thorough forensic investigation” that definitively details how much damage has taken place.

Want additional insight? Download Hiring a Business Coach for Your Small Business now 


3. Validate the integrity of your data backup. Since many cyber attacks take the form of encrypting precious data and rendering it inaccessible to you and your business, it’s critically important to have redundant data storage systems up and running at all times. These redundant servers and ancillary equipment must be maintained apart from your primary system, to protect against “collateral damage” from a virus or malware.

4. Repair the damage. If and when an attack does occur, “it’s time to begin the restoration process,” advises IT security specialist Andrew Douthwaite. Reformat hard drive volumes. Reinstall operating systems and applications. Adds Douthwaite: “After the breach it's vital that you verify your backups are good.”

5. Notify constituencies about the cyber attack without evasion or ambiguity. Virtually all IT security experts agree on the importance of communicating with various constituencies in a clear, forthright manner. To employees, customers, vendors and—if necessary—the media, you should share as many details of the incident as appropriate and outline the actions you’ve taken to repair the damage and ensure against future attacks.

Any executive’s initial impulse might be to deny or mitigate the truth, but remember—the integrity of your brand is at stake. Attempting to misstate or spin what happened in a way you think may bolster your image is extremely risky. A certain amount of consumer trust is lost when news breaks of a successful cyber attack; if customers or employees or the media then suspect you’re covering up what happened, more trust will be lost, possibly forever.

Planning for the worst is the most effective strategy. As part of that effort, revisit your crisis plan at regular intervals, recognizing that technology (and company personnel) keep changing as well.

To try and keep yourself from being a target for a cyber criminal in the first place, register to watch our BOSS Webinar about Why Small Businesses are a Cyber Criminal’s Favorite Target, at 10 a.m. (MDT) Wednesday, August 16, 2017.

Read our 19 Reasons You Need a Business Owner Advisory Board


Written by The Alternative Board

Related posts

Future of Work: How to Manage Your Mobile Workforce
Jul. 16, 2018 | Posted by The Alternative Board
The American workforce is changing the nature of “work” as we once knew it. The days when employees absolutely had to work at a desk, in an office, are long gone. While many businesses still insist...
What Kinds of Technology are Best for Driving Growth?
Apr. 9, 2018 | Posted by The Alternative Board
 Advances in technology have significantly leveled the playing field for small and mid-sized businesses. They now have access to much of the same technological resources previously available only to...
How Technology Can Boost Your New Employee Recruitment Efforts
Apr. 9, 2018 | Posted by The Alternative Board
Gone are the days of job-seekers finding jobs in a newspaper’s classified section. Even online job boards aren’t as effective as they once were. To be competitive in today’s marketplace, businesses...
4 Warning Signs It’s Time to Upgrade Your Technology
Apr. 9, 2018 | Posted by The Alternative Board
   Digital and mobile technology have become essential for the effective operation of virtually every business. But precisely what technology your small business needs depends on a wide range of...
How to Improve Workplace Communication With Technology
Mar. 5, 2018 | Posted by The Alternative Board
If enhancing communications with your employees is on your list of resolutions, utilizing digital technology can help you achieve this goal. Businesses that still rely on a “suggestion box” in the...
4 Ways to Turbocharge Your Social Media Marketing Strategy
Sep. 6, 2017 | Posted by The Alternative Board
It’s a safe bet that most of your customers are active on social media. Therefore, it stands to reason that your marketing efforts should include reaching out to existing and prospective customers...
How to Leverage Technology to Strengthen Your Sales Culture
Aug. 30, 2017 | Posted by The Alternative Board
Anyone involved in sales will likely agree that conventional sales processes of the past—even the recent past—are giving way to a new order. The newer approach leverages the use of digital...
Why Optimizing Your Website is Good for Your Business
Aug. 16, 2017 | Posted by The Alternative Board
  A sizeable percentage of your customer base is already using their mobile devices to purchase your products or services. In all likelihood, given current statistics, this percentage will grow...
How to Embrace Changing Technology as a Small Business
Aug. 1, 2017 | Posted by The Alternative Board
We all know technology is changing at warp speed, so it’s easy for small businesses to feel they can’t keep up—or worse, to feel too intimidated to even try to do so. There’s also the concern that...
Media Training – You Only Get One Chance to Make an Impression
Sep. 25, 2013 | Posted by The Alternative Board
Sharon Cain , a former on-screen Sky TV and BBC reporter, trains key spokespeople from the public and private sector on emotive issues spanning investment decisions, deaths, redundancies and...