News

14/12/2013 20:20
Innovative Insurer becomes the first to manage 1,000 breaches.Beazley, the pioneer in breach response insurance, is currently managing its 1,000th breach. This marks the 1,000th time that...
13/12/2013 06:21
Compelling companies to notify supervisory authorities when a breach occurs will drive the growth of cyber insurance in the EU. The Civil Liberties, Justice and Home Affairs (LIBE)...
12/12/2013 00:00
If someone steals your credit card number, the issuer doesn't make you pay. They get their money back through user fees and insurance. When I first heard about Beazley's security breach insurance, I...
11/12/2013 08:34
The frequency, sophistication and severity of data breaches is set to explode in 2014, according to two new industry reports.  For the savvy insurance producer, that means an increased...
<< 64 | 65 | 66 | 67 | 68

 

 

 

Cyber Rescue Ltd.

Image result for Security breach

 The First 24 Hours Checklist 

  

Panicking won’t get you anywhere once you’ve discovered a data breach. Accept that it’s happened and immediately contact your legal counsel for guidance on initiating these 10 critical steps:

  • Record the date and time when the breach was discovered, as well as the current date and time when response efforts begin, i.e. when someone on the response team is alerted to the breach.

  • Alert and activate everyone on the response team, including external resources, to begin executing your preparedness plans.

  • Secure the premises around the area where the data breach occurred to help preserve evidence.

  • Stop additional data loss. Take affected machines offline but do not turn them off or start probing into the computer until your forensics team arrives.

  • Document everything known thus far about the breach: Who discovered it, who reported it, to whom was it reported, who else knows about it, what type of breach occurred, what was stolen, how was it stolen, what systems are affected, what devices are missing, etc.

  • Interview those involved in discovering the breach and anyone else who may know about it. Document your investigation.

  • Review protocols regarding disseminating information about the breach for everyone involved in this early stage.

  • Assess priorities and risks based on what you know about the breach.

  • Bring in your forensics firm to begin an in-depth investigation.

  • Notify law enforcement, if needed, after consulting with legal counsel and upper management

Source: Experian Data Breach Guide

 

CEO & C-Level Executives 

Role in 

Data Breach Management

click here

Experian_DBR_response_guide_15_09_23_DD_MWF