News

15/09/2019 08:25
Almost 80% of large U.S. maritime industry companies (more than 400 employees) reported that cyberattackers targeted their companies within the past year, according to a maritime cybersecurity survey...
11/09/2019 07:17
American International Group said it is finalizing a transition to affirmative cyber coverage across its global commercial lines. As of January 2020, AIG said that virtually all of its commercial...
14/08/2019 10:42
This Guide aims to draw attention to the importance of planning how to manage a cyber security incident ahead of time.  Cyber security incident management is not a linear...
10/08/2019 23:53
Organizations are embedding connected digital technologies in their information technologies, operational technologies, and end products, making cyber a top organizational priority. Innovating fast...
03/08/2019 09:12
PWC was challenged for the unlawful processing of their employees' data The Greek Data Protection Authority issued a fine of € 150,000 against PWC under the GDPR for unlawful processing of the...
25/07/2019 08:08
Business email compromise (BEC) has overtaken ransomware and data breach by hackers as the main driver of AIG EMEA cyber claims, according to the latest cyber claims...
10/07/2019 22:15
CyberOwl has engaged with over 50 shipping owners, operators and equipment manufacturers in the last 12 months. More is being done on vessel cyber-physical security than is publicly evident....
29/06/2019 12:10
Cybersecurity issues are increasingly becoming a concern in mergers and acquisitions, a new survey shows, and lapses can jeopardize deals or haunt purchasers long after the deal is done. Of more than...
27/06/2019 07:08
Every day, more than 50,000 merchant ships cross the oceans with millions of cargo containers in tow, signalling the need for fast and efficient communications aboard vessels, and between land and...
25/05/2019 07:47
Ransomware attacks skyrocket, Q1 2019     Ransomware attacks skyrocketed in the first quarter of 2019, according to the Beazley Breach Response (BBR) Services team, which...
08/05/2019 10:19
During the 2019 SAFETY4SEA London Conference, Mr. Chronis Kapalidis, Cyber Expert, Hudson Analytix, talked about cyber threats in shipping. He noted that cyber attacks are becoming more...
11/04/2019 07:49
Last year, we responded to over 1,000 cyber claims comprised of theft of funds, data breaches, ransomware & extortion, malware and more. Here are some of...
06/04/2019 10:49
Near about 70% of senior maritime sector administrators in the US believe, the sector is prepared to respond to cyber attacks, whereas half of that number believes their own businesses are ready....
05/04/2019 09:55
Beazley Breach Response Services publishes latest annual report Business email compromises (BEC) accounted for 24% of the overall number of incidents reported to Beazley Breach Response (BBR)...
<< 1 | 2 | 3 | 4 | 5 >>

 

 

 

Cyber Rescue Ltd.

Incident Response

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

  Bachelor's in Cybercrime

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here