Action is the cure to all business growth! As it is in security awareness training being proactive instead of reactive determines success of your data.
Brief the board and senior management
Call an emergency meeting to brief the board and senior management on the incident, steps taken and further actions to be carried out.
Conduct IT forensics
Have IT investigate the breach to find the attack vector. If an executive’s email has been hacked, take immediate action to recover control of that account such as changing the password. But don’t stop there, the
likelihood is that the organization has been further infiltrated and other accounts have been compromised. Have them run the gamut of detection technologies to find any and all malware that may be lurking to strike
Bring in outside security specialists
If the organization was breached, it highlights deficiencies in existing technology safeguards. These will prove harder for IT to spot. So bring in outside help to detect any area of intrusion that IT may have missed. The goal is to eliminate any and all malware that may be buried in existing systems. The bad guys are inside. The organization isn’t safe until the attack vector is isolated and all traces of the attack have been eradicated. This
is no easy task.
Next time..Action Step Three…till then Think Before You Click!
Tina Louise ~ http://www.cloudplusservices.com ~ 888.871.6584