Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack

Data breaches are very costly. Organisations should consider three basic steps to ensure they are prepared to remedy a future breach.

Over the last year there have been a variety of high-profile security breaches ranging in severity, from TalkTalk, which was fined £400,000 for its 2015 breach, to Yahoo, which had $1 billion of its potential value wiped by the news of its own hack.

When looking at most security breach cases it’s clear that the size of their financial implications is often vastly underestimated. Companies need to put the same amount of effort into protecting against the immediate aftermath of a breach, as they do in its initial prevention.

Mobile breaches present a particularly unique challenge for organisations. Responding to any cyber breach is complicated, but the complexity is often worsened due to the personal nature of a mobile device itself.

A tangled web of data cross-pollination is being created due to the increasing popularity of BYOD and work emails on personal devices. This means that productivity can increase among employees, but with greater mobile use comes significant complications around clean-up and remediation when those mobiles are breached.

With employees innocently pushing forward with productivity, IT departments must take control of the security implications.

A recent study from Wandera found that companies spend three times as much on remedying a mobile security breach than they could have spent to simply prevent it in the first place.

In the UK alone, the average cost of remedying an enterprise mobile security breach stands at an astounding £167,000. To avoid this, organisations need to consider three basic but crucial steps to ensure they are sufficiently prepared to remedy a future breach.

1.    Assess and notify

This should be at the top of the to do list when a breach occurs. The news will need to be shared within your organisation immediately. Too often businesses are silent when data breaches occur, as though the fear of external discovery outweighs the importance of having a wider discussion throughout the organisation.

In terms of a mobile data breach, businesses need to realise that the situation is different. The split personality of a mobile device, by definition, involves an individual as well as the business. The faster the company notifies everyone involved and shares intelligence on what was breached, the less of a ripple effect the breach will have.

Passwords will need to be changed, including all device passwords, not just those used within the company, but any that were put at risk. Defensive steps will also need to be taken if sensitive data such as contact lists, credit cards, business or personal images and location information was leaked.

2   Perform a forensics analysis

To truly clean up a breach, there must be a clear understanding of how it occurred and what was put at risk. Performing a post-breach forensics investigation must start with visibility across the mobile fleet in the first place.

To get ahead before a breach occurs, companies should invest in a mobile threat defence solution that can provide data on how the breach occurred, which users were impacted and provide clues as to which data may have been compromised.

With complete visibility of the issue, businesses will be aware of what the next move needs to be to minimise further damage.

3.    Improve defences

The visibility that is obtained during forensics investigation can also pave the way for improved defences via policy controls in the future. Typically, IT teams roll out an open mobility program to start allowing users to install their own apps and ensure there are no restrictions on websites they can access.

As breaches occur, compliance violations are observed and as productivity concerns are raised, IT will often need to take a step back and implement mobile data policies to ensure that these corporate resources are used effectively and securely.

Companies need to take a close look at their access policies after a breach and ensure that adequate steps are in place to protect mobile data, while simultaneously safeguarding users’ productivity.

Security breaches don’t have a consistent formula or uniform. They come in different shapes, sizes and levels of damage, meaning there isn’t one way for businesses to protect themselves against a breach.

The sad reality is that it’s a case of ‘when’ a security breach will happen, instead of ‘if’ now, and organisations must be prepared for the aftermath.

As the probability of a hack increases, and the use of employee devices increases alongside this, organisations must take the above three steps into consideration to ensure that issues after the breach are minimised.

Information-Age:       Tech Jobs Would Be Great, If It Wasn’t For The Users:

 

 

« Social Media & The New Advertising Model (£)
Spies Use Tinder »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Information Technology & Cyber ​​Security Service (STISC) - Moldova

Information Technology & Cyber ​​Security Service (STISC) - Moldova

STISC is a public institution whose purpose is to ensure the administration, maintenance and development of the information technology infrastructure in Moldova.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Smarttech247

Smarttech247

Smarttech247 deliver a range of cyber security solutions, including cognitive security services using IBM Watson for Cybersecurity, SIEM, Compliance & Governance, and Penetration Testing.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Smart Hive

Smart Hive

Smart Hive has created a platform that will allow organizations to share real-time, relevant and actionable threat intelligence among each other while maintaining confidentiality.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

WhiteJar

WhiteJar

WhiteJar offers an innovative approach to modern cybersecurity needs, empowering Ethical Hackers within its unique crowd platform.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Royal United Services Institute (RUSI)

Royal United Services Institute (RUSI)

The Royal United Services Institute is an independent think tank engaged in cutting edge defence and security research. Areas of research include cyber security and resilience.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.