News

22/11/2018 07:36
The current report contains a statistical analysis of the security findings discovered by ADACOM Cyber Security during a period of three years and a sample of 200 security engagements of various...
21/11/2018 07:48
Six months ago, May 25, 2018 to be exact the General Data Protection Regulation (GDPR) came into effect in the European Union – but its implementation happened with a "whimper" rather than a "bang",...
10/11/2018 06:47
The first industry report of its kind, the Global Maritime Issues Monitor 2018 takes a global look at the major issues that are likely to impact the global maritime industry over the next 10...
07/11/2018 16:37
PHILADELPHIA, Nov. 7, 2018 /PRNewswire/ -- NetDiligence®, a leading provider of cyber risk readiness and response services, announced today it has published its eighth annual Cyber...
04/11/2018 00:39
"The U.S. maritime industry is not prepared for future cyber-attacks," maritime law firm Jones Walker LLP has warned in a new survey and report released October 23. The report comes a year after...
03/11/2018 11:36
  In recent months, Beazley Breach Response (BBR) Services has seen the number of reported ransomware incidents climb again. The varieties of ransomware and the differing technical abilities of...
30/10/2018 07:33
Recently, the French Data Protection Authority (the “CNIL”) published a statistical review of personal data breaches during the first four months of the EU General Data Protection Regulation’s...
08/10/2018 07:32
On Tuesday, 25 September Facebook was dealt its most massive security breach that sent shockwaves worldwide. 50 million of its users’ accounts had been left compromised, including that of its CEO...
03/10/2018 19:15
It is worrying to see the shipping news talk about cyber attacks and failed defences, especially when the industry has had several 'wake-up calls'. But once the media stops reporting on cybersecurity...
01/10/2018 07:44
Recently, a team of breakers at ethical hacking firm Pen Test Partners proved there are several ways to break into a ship's navigation system and potentially cause a major incident. So, after all the...
30/09/2018 08:43
Innovation Driving Digital Transformation and Preparing for GDPR Baker McKenzie is pleased to provide you with complimentary access to the 2018 edition of our Global Privacy and Information...
28/08/2018 10:59
This manual is packed with actionable info that you need to prevent infections, and what to do when you are hit with ransomware. You will also receive a Ransomware Attack Response...
28/08/2018 10:53
CEO fraud has ruined the careers of many executives and loyal employees. Don’t be one of them. CEO fraud has victimized more than 22,000 organizations and is responsible for over $3...
18/08/2018 20:28
  Although cyber risk premiums have expanded sizeably in recent years and loss ratios compared favourably relative to other product lines, sustainable growth of the cyber insurance market...
13/08/2018 07:44
There is a very large untapped market for selling cyber insurance to small businesses. How can brokers best approach small business owners to offer them cyber coverage? A recent 2018 study of...
<< 1 | 2 | 3 | 4 | 5 >>

 

 

Cyber Rescue Ltd.

Image result for Security breach

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

 

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here

Experian_DBR_response_guide_15_09_23_DD_MWF