A 5 step guide of actions necessary in the face of Security or Privacy breaches
What can SMEs do if they experience a security or privacy breach?
January 10th, 2022
Security and privacy breaches are on the rise globally, with potentially serious implications for businesses that are not able to handle them promptly and efficiently.
This can feel like a vast and confusing maze to navigate, especially for small and medium businesses, if underprepared.
However, with just a few simple steps, businesses can ensure they are taking the most appropriate response to a breach and giving themselves the best chance of mitigating the impact of an attack. You can see the top five suggestions below from our Head of Security and CISO as a Service Consultant, David Clarke.
A 5 step guide
What to do the face of Security or Privacy breaches
- Once a breach is discovered, getting all the key stakeholders together to establish some ground rules about how to deal with the breach is key. This should be done whilst maintaining a ‘no blame’ approach to operations. Additionally, the incident should be given a code name for use in emails and discussions to maintain clarity.
- It’s then necessary to capture every piece of known, suspected or inferred information about the breach to get an overview of the situation. The targeted business should only work with verifiable facts, even if there are very few, and all decisions must be directly logged. Crucially, it’s vital to ensure that no suspicion or guesswork is released outside of the key stakeholders. Once ready to release information outside of the company, ensure that it is only via a named spokesperson.
- In the case of a personal data breach, the business should, in the first instance, work on the data subject risk analysis. For example, will this breach cause detriment to the data subject? It will then be necessary to verify and check all possible evidence and challenges. After the breach, only 20% or less of the data will remain available. This is why the business should start to size, scope and quantify the breach on an ongoing basis.
- Senior management should be briefed only with facts and factual based risk assessments. However, the business should also be prepared to notify the relevant authorities and/or Data Subjects in a controlled manner.
- Regulatory bodies will judge a business based on how breaches are managed, not the breach itself. Ensure to register the issue with authorities if required, for example if the risks are very high. Initial focus must be firmly on gaining a level of control, confidence, and containment over the breach.
Ultimately, businesses should reach out for professional assistance if needed. Work on containing the breach to make eradication easier.
If you’d like more support or out any further information on measures you can take to protect your business, get in touch.
Incremental change or all at once? How to approach IT transformation
A good percentage of businesses will undertake some level of positive transformation using IT, some will spend the money and stay static, but others will end up losing money, market share and more. ‘Big Bang’ style IT transformations seldom work To put things into context – according to Forbes, Mckinsey and Harvard University, around 70% […]
How to protect your business from social engineering
IT security has been at the forefront of business news at the moment, highlighting how vulnerable companies are to targeted attacks by hackers. Symantec reported that five out of six companies suffered an attack of some kind in the previous year whilst the BBC emphasised a report compiled by Verizon which suggested that it takes […]
How to create an email retention policy
Email retention policies are all about decreasing the risk to your company. But for a truly successful policy, you need to strike the balance between a retention period which is too long and keeps useless mail around and one which is too short and loses mail that was important. Your policy needs to take into […]