News

26/01/2019 06:58
The latest threat to cybersecurity isn’t a new form of attack vector — it’s the operational risk that can occur when using Microsoft Office 365 (O365). Research firm Gartner found that 13% of...
13/01/2019 09:03
General Data Protection Regulation (“GDPR”) six months on Six months on from the General Data Protection Regulation (“GDPR”) coming into force, GDPR is having the desired effect with...
19/12/2018 07:21
UK cyber policyholders are more than twice as likely as their US counterparts to claim for social engineering-driven attacks It wasn't long ago that it was fairly easy to spot a social engineering...
07/12/2018 15:16
Santa Claus had been the victim of a significant cyber-attack by hackers who do not love Christmas in order to control the naughty list he maintains with the reasoning for not sending the...
07/12/2018 14:07
More than 8,000 data breaches have been reported in the UK since the General Data Protection Regulation (GDPR) took effect in May, the information commissioner has said. Elizabeth Denham revealed the...
02/12/2018 09:34
Marriott hotel chain is the most recent 'big name' that fell prey to a cyber attack, after the discovery that personal data of their clients had been breached. It was such a big story that made the...
30/11/2018 07:45
In an increasingly connected and technologically dependent world, new areas of vulnerability are emerging.  This article explores the unique challenges of maritime cyber security in order to...
29/11/2018 07:00
Every day technology companies enable people to connect and businesses to operate in new and innovative ways. With twenty years’ experience providing insurance to some of the world’s most disruptive...
27/11/2018 06:39
A German privacy regulator has issued its first GDPR fine after a hacker stole unencrypted data on hundreds of thousands of customers of a local chat app. The Baden-Württemberg Data Protection...
22/11/2018 07:42
In the first part of this double feature, Katherine Dunn investigates an emerging security risk for the shipping industry, as maritime authorities report a rising number of GPS failures Early one...
22/11/2018 07:36
The current report contains a statistical analysis of the security findings discovered by ADACOM Cyber Security during a period of three years and a sample of 200 security engagements of various...
21/11/2018 07:48
Six months ago, May 25, 2018 to be exact the General Data Protection Regulation (GDPR) came into effect in the European Union – but its implementation happened with a "whimper" rather than a "bang",...
10/11/2018 06:47
The first industry report of its kind, the Global Maritime Issues Monitor 2018 takes a global look at the major issues that are likely to impact the global maritime industry over the next 10...
<< 1 | 2 | 3 | 4 | 5 >>

 

 

 

Cyber Rescue Ltd.

Image result for Security breach

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here

Experian_DBR_response_guide_15_09_23_DD_MWF