What Should You Do If Your Business Is Hit By A Cyber Attack?

Cyber-attacks aren’t letting up, with corporate giants such as Facebook, British Airways and Marriott International all hitting the headlines in the last 12 months. Yet, despite publicity around these high-profile cases, for small businesses, it’s still tempting to think that cyber-attacks aren’t something that you really need to worry about.

Unfortunately, this couldn’t be further from the truth, with research showing that 42% of small businesses were hit by a cyber-attack in the last 12 months.

Smaller Businesses Soft Target for Hackers
By their very nature, small business owners are constantly spinning plates, so it’s no wonder that preparing for cyber incidents isn’t top of the to-do list. Yet, hackers have become wise to this, often seeing SMEs as a soft target, without the funds, time or knowledge to defend themselves.

Research shows that the majority of small businesses still aren’t taking the threat seriously. More than a third (37%) don’t have a cybersecurity plan in place and 40% per cent wouldn’t know who to contact if a crime was committed. With the average annual cost of a cyber breach standing at around £25,700, it is time to sit up and take notice.

Even if you have all the right technology and processes in place, sometimes you’re powerless to stop a breach. This is why an effective response plan is essential, enabling you to control the situation as quickly as possible, with minimum impact to you and your customers.

How to respond to a Cyber Attack
Want to make sure you’re prepared? Then, your cyber-attack response plan should include the following:

Arm Yourself with Knowledge
Speed is of the essence following a cyber-attack. You need to know what caused the breach, with a view to rectifying the problem quickly and ensuring it doesn’t happen again. As a small business, chances are you don’t have this expertise in house, so you should line up IT forensics experts for if and when you need them.

Your Legal Response
There are numerous legal issues to consider, particularly since the introduction of the GDPR last year. These include informing the Information Commissioner’s Office (ICO) of the breach, defending your business against any claims of malpractice, as well as managing your approach to customers and the media. For this, you’ll need a good lawyer, ready to support you from the moment you’re aware of the problem.

Handling Media queries
You could be the focus of media attention following a breach, so be ready to handle all external communications about what happened and how you’re responding. Again, time is of the essence, so you’ll need to have statements ready to go asap. If you don’t have your own PR expertise internally, make sure you have external support – whether an agency or experienced consultant, on speed-dial.

Informing Customers
Depending on your customer-base and the scale of the breach, you could have a lot of unpleasant phone calls to make! You’ll need to be ready with a way to handle this communication efficiently across numerous channels, including at least email and telephone. As a small business, this communication should be as personal as possible, but your lawyer will be able to advise on what you should and shouldn’t be saying.

Make Sure You’re Covered
If the worst does happen and you’re facing the repercussions, your final line of defence is a watertight and specialist cyber insurance policy. Bear in mind that policies can vary significantly, so be sure to seek specialist advice regarding the best option for your needs and how these might change over time. Some insurance policies will also offer an immediate response plan and external expertise as part of your cover, giving you one less thing to worry about. 

Finally, it is worth highlighting that the GDPR imposes the same responsibility on all businesses that handle personal data, irrespective of size. The potential impacts of a breach are great, with fines as much as €20m. So make sure you’re on top of cyber security, before it’s too late.

Training Your Employees and Yourself
Last, but certainly not least, you should first train your staff and management about Cyber protection and comprehension of cyber security. 
This can be done at low cost by taking focused on-line cyber security lessons for a few minutes every day for a few weeks and keeping everyone up to speed every few months by a few daily lessons on cyber security protection. 
The results reduce your cyber security risks significantly. 

Contact us at Cyber Security Intelligence for more information.

ByteStart:

You Might Also Read:

How To Develop Secure Cybersecurity Practices:


 

 

« Over 90% Of Security Pros Fear Insider Threats
Combining AI’s Power With Self-Centered Human Nature Could Be Dangerous »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

Rwanda Information Society Authority (RISA)

Rwanda Information Society Authority (RISA)

RISA is at the forefront of all ICT project implementation, research, infrastructure and innovation within the ICT sector in Rwanda.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity

Breadcrumb Cybersecurity is a cybersecurity and advisory firm. We specialize in penetration testing, threat hunting, incident response, regulatory compliance, and employee training services.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

Beetles Cyber Security

Beetles Cyber Security

Beetles is a crowdsourced penetration testing platform designed to build a trusted, hacker-centric approach to protectan organization’s digital attack surface.

Hushmesh

Hushmesh

Hushmesh is a start-up aimed at securing the world’s digital infrastructure by developing develop the Mesh, a global information space with automated security built in.

Advanced IT

Advanced IT

Reliable managed IT Security & support services that will help you take your business operations to the next level without breaking the bank!

PowerDMARC

PowerDMARC

PowerDMARC is a domain security and email authentication SaaS platform that helps organizations protect their domain name, brand, and emails against unauthorized use.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.