What to do when the cats out of the bag..
I just Got Breached; now what!
- Heath Wruble
You or your company
just got breached,
no, not by a bunch of
robbers or an opposing company,
but by cyber terrorists. What
did they take, how far did they get, what do we do now?
You have heard
about companies being breached and client data stolen; you may have even heard
a story or two about a ransom demand for the stolen data. One law firm was
breached, data was stolen, and the cyber-terrorists demanded millions for the
data, or they would release compromising emails, papers, and other legal
documents if their demands were not
met. The law firm did
not take the bait and stood up to these threats.
Is this
something you would do, knowing compromising material was out there? Would your
clients understand and stand by you, or would
they be running
for the hills with lawsuits to follow,
destroying everything you built up, years of sweat and tears down the drain or will you end up paying the ransom to maintain your business?
What do you do when you are notified
of a breach, and how would you handle it?
You need to
think about cyber security threats before they happen, implement systems that
help you avoid intrusions, and create a plan to react to these threats and events before
they happen. Plan for the
worst hope for the best.
Smart and effective leadership starts from the top and impacts the entire organization. Planning is an integral part of an organization
including threat prevention, detection, and resolution.
Protections in place prior to a breach:
Prevention,
All organizations must ensure proper Information Technology (IT) systems are in
place including firewalls, dual authentication passcode systems, and employee
training. These are just a few components
organizations must undertake to help prevent cyber intrusions. Read my previous
article called “Cybersecurity is on my Mind” for some great ideas on how to properly implement
a strong effective, secure system.
Building and maintaining an effective system
will make it much harder for cyber bullies to get into your computer
system, however, you must be prepared to react to any cyber intrusions at a
moment’s notice.
Backup, As
part of any effective IT system currently in place, you should have a strong
reliable backup system. Backups are the best level of defense for ransomware
attacks. Additionally, ensure that any agreement you maintain with your backup
server provider (the vendor service agreement) reflects maintaining a full server image (this is a complete
picture or copy of all of your data at a given time)
and the ability to switch on your back up servers in the cloud for
immediate recovery.
Team IT,
maintaining a reliable in-house IT team, or outside third-party IT provider,
properly certified with the most up-to-date Microsoft
skills and training,
makes all the difference.
These professionals will help monitor your systems, react, and
help train current and new employees on best practices.
Detection helps monitor
your systems and employee activity to prevent or react to cyber intrusions.
Some firms even test their employees throughout the year by sending fake phishing scam emails to see
which employees take the bait. They normally follow up with better training for
all employees, but
especially those
that are most vulnerable. Ensure
you have a specific employee
or group of employees
responsible for monitoring cyber security breaching attempts in order to
effectively react to any attempts or actual breaches (aka your IT Team).
What to do once a breach occurs:
Take Action: when you are notified of the breach,
you first need to ensure that all other vulnerabilities
are shut down; you need to turn the spigot off immediately to ensure no more
data is lost, including changing passwords.
Investigate, and determine how you were breached.
Did they get passed your firewalls, or did they send an email
with a link, and that link
allowed them to burrow into your system?
Your IT team will be all over this, once they determine how then
you can implement additional preventive measures for the future. Conduct a deep
dive into the data that was affected, and identify critical data that was
stolen, In some cases, there was an attempt, but the criminals were not
successful. In some cases, hiring a professional third-party consultant to help
evaluate and respond to a breach should be considered.
Resolution
ensures a quick response and rapid resolution to any cyber-attacks. This takes
a dedicated team, working with your vendors and senior managers to be able to
quickly pivot and react to new threats, be completely open with your employees and customers, come up with one message
and stick with that message,
pay for data protection services for customers that have been adversely
affected.
Notify,
that news of the breach will leak sooner rather than later, it will be reported
that your systems are vulnerable, and you were attacked.
Once you have identified the affected data and or clients, tell them
it’s that simple, it is actually the law. There will be some angry
conversations, but this is something you need to go through; make sure you have
the facts right before you call, and come up with a solution to protect the
clients from further hassle, your main priority is to protect the client and
understand that receiving this type of news causes concern. The focus should be
helping the customer through these trying times and your communication is
paramount.
Communication, The best approach is to be upfront
with your employees and your clients as quickly as possible, if not you will no longer control
the narrative. When you control
the narrative, you are better
able to control the outcome and thus better able to withstand the media
onslaught.
The first step
is to talk to your employees and stress that any questions from media or
regulatory authorities need to be transferred to the Critical
Response Team (seriously, you do not have one, I
will explain the team’s purpose in the next paragraph). Any questions from
clients can be addressed by employees within the organization as long as they
follow the script and stay on topic (the CRT team needs to be able to provide a
script for all members of the organization). Set up an escalation process, with
a special dedicated media team, to handle the more difficult client calls as
well as media and regulatory inquiries.
Critical
Response Team, what is that? This is a dedicated team that should be set up
in advance; before there is ever an issue, this team will create steps,
processes, and procedures to implement for a data breach. The team should
have set leadership, meet regularly, even if there hasn’t been a breach,
written procedures to follow, call lists to notify key leadership and
management, and the ability to react and pivot to threats. The team should be
comprised of the following:
·
Technology leaders who understand the nuisances of data breaches.
·
Communications
(Press office, Marketing, etc.) to help craft and respond to the public,
clients, and employees.
·
Legal, to ensure
all applicable laws are being
followed and timely
action is taken.
·
Senior Management to oversee
and ensure leadership is well informed but also
plays a critical role in the response process.
·
Operations, key operations point person to ensure the continued operation of the organization.
Depending on how large your company
is, you may add additional members to ensure
continued business operations
and better communication throughout the company.
When
communicating with clients and others, be clear, show them that you have the
situation under control that you are on top of the matter, that you are as concerned as they are, and will do everything you can to protect them. The
message could be as simple as the following:
“At this time,
we can inform you that there was a cyber intrusion and breach of our systems. We
are working with our partners and have hired an outside consultant to determine
how and what was compromised, Rest assured we take these issues seriously and
will communicate with you once we are better able to determine what was affected.
In the meantime, please be extra vigilant when receiving emails or phone calls
claiming to be from our firm. We will never ask you about personal information
without requesting additional identification, and we will never provide confidential information over the phone unless we obtain additional
identification from you. We will keep you updated throughout this process and
inform you if your data was affected.”
This shows your
clients you have the situation under control, you are being open, and you
understand their concerns, if clients continue
to ask questions that staff are not able to answer make sure you have
an escalation process that will escalate these concerns to a more experienced
team.
Rectify work to resolve
the breach by upgrading your systems and policies, training
internally, educating clients,
and working with vendors. Provide credit monitoring to the clients affected.
Improve
your image, you may take a publicity hit, it will not be pleasant, and there
may be news articles that will not be kind to you or your company. Work through
them slowly and honestly, effectively communicate, and do not try and spin the
bad news. Acknowledge the breach, inform them of your steps, and ensure
the public as well as your customers you are taking
this matter seriously and that the firm is taking corrective action. This
will go a long way with your clients, with the public, and with your employees.
Regulatory requirements may be necessary, depending on the type of business you are in, make sure you loop in outside counsel to ensure
you are following the necessary rules and regulations.
Cyber breaches
are a trying time for any organization, large and small. Voices will be raised,
and tempers may flair. do not take these altercations personally and understand
the stress everyone is under. With the proper planning and open communication,
you and your organization will muster through and will prevail. Do not forget
to get the best systems
possible to help better protect
your organization but most
importantly, your client's information; train your employees and test your
systems regularly; and set up a response team to be better prepared and hope
for the best but prepare for the worst.