News

28/02/2019 17:35
There can often be a disconnect between a company’s management of its IP risks and its other risks. It is rare for risk managers to become involved in evaluating and managing risks related to a...
27/02/2019 08:06
A new cyber risk has been threatening companies in recent months, playing into the fears of business owners and employees and trying to blackmail them out of money. International specialist...
25/02/2019 11:24
On 25 May 2018 new data breach notification laws came into force across Europe which fundamentally changed the risk profile for organizations suffering a personal data breach. Under the EU General...
22/02/2019 10:09
Opportunistic cyber criminals are engaging in a new, darker strain of email compromise by attempting to bribe recipients into paying crypto-currency ransoms using so-called ‘sextortion’...
17/02/2019 08:49
NeuroSOC, as part of the malware/abuse service that it provides, has recently captured two samples which concern a spam campaign (a DHL General Price Increase e-mail and...
26/01/2019 06:58
The latest threat to cybersecurity isn’t a new form of attack vector — it’s the operational risk that can occur when using Microsoft Office 365 (O365). Research firm Gartner found that 13% of...
13/01/2019 09:03
General Data Protection Regulation (“GDPR”) six months on Six months on from the General Data Protection Regulation (“GDPR”) coming into force, GDPR is having the desired effect with...
19/12/2018 07:21
UK cyber policyholders are more than twice as likely as their US counterparts to claim for social engineering-driven attacks It wasn't long ago that it was fairly easy to spot a social engineering...
07/12/2018 15:16
Santa Claus had been the victim of a significant cyber-attack by hackers who do not love Christmas in order to control the naughty list he maintains with the reasoning for not sending the...
07/12/2018 14:07
More than 8,000 data breaches have been reported in the UK since the General Data Protection Regulation (GDPR) took effect in May, the information commissioner has said. Elizabeth Denham revealed the...
02/12/2018 09:34
Marriott hotel chain is the most recent 'big name' that fell prey to a cyber attack, after the discovery that personal data of their clients had been breached. It was such a big story that made the...
30/11/2018 07:45
In an increasingly connected and technologically dependent world, new areas of vulnerability are emerging.  This article explores the unique challenges of maritime cyber security in order to...
29/11/2018 07:00
Every day technology companies enable people to connect and businesses to operate in new and innovative ways. With twenty years’ experience providing insurance to some of the world’s most disruptive...
27/11/2018 06:39
A German privacy regulator has issued its first GDPR fine after a hacker stole unencrypted data on hundreds of thousands of customers of a local chat app. The Baden-Württemberg Data Protection...
22/11/2018 07:42
In the first part of this double feature, Katherine Dunn investigates an emerging security risk for the shipping industry, as maritime authorities report a rising number of GPS failures Early one...
<< 1 | 2 | 3 | 4 | 5 >>

 

 

Cyber Rescue Ltd.

Image result for Security breach

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

 

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here

Experian_DBR_response_guide_15_09_23_DD_MWF