Site icon News Azi

Breached? Don’t panic… if you created a robust IR plan | Computer Weekly

Cyber security incidents are on the rise, and organisations must ensure they have robust incident response plans in place should the worst happen. From threat assessment to rapid recovery strategies, what steps should security professionals take to protect organisations against unexpected disruptions?

As they say in The Hitchhiker’s Guide to the Galaxy: don’t panic! If an incident occurs, it’s important to be clear about your expectations across the business because responding to a security incident is a team sport. A key aspect of this coordination involves communicating actions calmly and concisely; this will help to avoid any knee-jerk reactions, which could escalate an already stressful situation.

From the outset, sticking to a clearly defined incident response process is vital – regardless of the perceived severity of an incident. Part of this means being able to quickly identify if an incident has taken place and then to know which steps are required to mitigate any impacts. That said, it’s also important to be flexible when dealing with a cyber incident because you never know how the situation will evolve.

Hope for the best; plan for the worst

Practicing your response in the event of a cyber incident is a valuable exercise. It’s sensible to prepare for the worst-case scenario – just in case – and work backwards from there. Having a clear idea of what a good resolution looks like is critical, especially when you’re communicating with multiple teams quickly.

Every cyber incident is different and there should be a response that accounts for all different types of threat. For example, ransomware requires considerably more forward planning to help mitigate risk – like having the foresight to ensure you keep plenty of regular backups.

With distributed denial-of-service (DDoS) attacks, you need to consider the longevity and impact. DDoS is often quite transient; it might disrupt your site momentarily and then everything will return to normal. Having said that, it’s important to note that a DDoS attack could also be a precursor to ransomware.

Review existing security capabilities – and identify any gaps

To protect your organisation, consider how critical each one of your systems and services is – and the impact if it were to be affected during a cyber attack.

You should also consider three key principles: confidentiality, integrity, and availability. This will enable your organisation to identify one, two or three focuses for its security controls. Once you’ve decided on the controls you need to put in place, you can incorporate the right incident management wrappers around them. 

Embrace failure (and learn from it)

Whether we like it or not, failures, large or small, are inevitable. In the context of cyber security, many organisations miss the opportunity to learn from past mistakes.

Maintaining accurate reporting is an effective way to monitor security threats and prevent similar incidents occurring in future. Understanding how your organisation’s systems operate and how they interact with one another is crucial.

Ensuring day-to-day processes, like keeping regular backups, and incident management specific procedures are regularly updated to align with the dynamic security landscape, organisations can bolster their security posture and mitigate harm.

Stay connected with us on social media platform for instant update click here to join our  Twitter, & Facebook

We are now on Telegram. Click here to join our channel (@TechiUpdate) and stay updated with the latest Technology headlines.

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsAzi is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – admin@newsazi.com. The content will be deleted within 24 hours.
Exit mobile version