News

28/10/2020 12:39
Ransomware has long been a scourge, and it has been growing into a pandemic with no signs of slowing down. I recently had the opportunity to discuss ransomware with several experts at...
15/09/2020 12:32
In the report you’ll find:  An analysis of claims data from Coalition policyholders that details which industries are impacted most by cyber incidents, how small business claims...
23/07/2020 10:55
Employee mistakes are having a potentially dire impact on enterprise cybersecurity, with 43% of workers admitting to making an error that had a negative impact on corporate digital security. This is...
23/07/2020 10:53
Vessels are becoming more connected to shore-based systems, meaning the cyber threat is ever-evolving - from crippling ports and terminals to spoofing attacks on ships. The shipping community has...
27/05/2020 07:54
Review of 2019 Despite increased investment in cyber security, the risk from attacks has increased significantly in the last year. In the qualitative review, three cybercrime...
27/03/2020 06:41
Countdown to new IMO cyber guidelines deadline Recognising current and emerging threats, the International Maritime Organization (IMO) has introduced new guidelines on cyber risk management in safety...
18/03/2020 12:34
In conjunction with our member carriers, DCSA has published the DCSA Implementation Guide for Cyber Security on Vessels for the global container shipping industry. The purpose of the guide...
10/02/2020 19:24
Last month the Information Commissioner's Office (ICO), the UK data protection regulator, imposed a monetary penalty notice of £500,000 on electronics retailer DSG Retail Limited (DSG), a company...
09/02/2020 11:49
Many executives either don't know what their company's cyber defense is, lack budget, or spend too much time analyzing rather than taking action. In a new poll of 2,800 cyber security...
23/01/2020 06:48
The call came in by radio one evening last September, at around 9 p.m. On the line was the master of a tanker, approaching the end of a monthlong journey from the Port of South Louisiana...
19/01/2020 15:19
We live in an age of innovation. Intangible assets, such as intellectual property, data, brands and technology, are of increasing strategic importance to businesses.  Protection is of essence...
16/01/2020 15:09
Every day technology companies enable people to connect and businesses to operate in new and innovative ways. nning a technology company involves balancing client demands with the restraints...
05/01/2020 06:46
Almost 60 years ago, Dwight Eisenhower gave his indelible speech on the military industrial complex. In the speech, he talked about the need “to find essential agreement on issues of great moment,...
27/12/2019 16:05
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) has teamed up with Deloitte Risk & Financial Advisory on publishing new guidance on managing cyber risks in a...
1 | 2 | 3 | 4 | 5 >>

 

 

 

Cyber Rescue Ltd.

Incident Response

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

  Bachelor's in Cybercrime

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here