Most InfoSec professionals are firmly focused on prevention. We build systems and adopt tools to help safeguard against phishing attacks and ransomware and all the other myriad threats that businesses face on a daily basis. But what we often end up with is a mish-mash of different technologies that have not been integrated or configured properly.
The potential cost of a data breach drives rapid adoption of new software, but the frenzied firefighting approach prevents us from stepping back and taking in the big picture. Before we can fully leverage the systems at our disposal, we must accept that incidents will occur and build a clear incident response plan that can be relied upon to guide us out of danger.
What is incident response?
Incident response is simply how an organization responds to a data breach or cyberattack. The aim is to limit potential damage and ensure a swift resumption of normal operations.
While the global average cost of a data breach is $3.86 million and it takes 69 days on average to contain a data breach, according to the Ponemon Institute, companies that were able to respond quickly and contain a breach in less than 30 days saved more than $1 million. Clearly, a proper incident response plan makes a lot of business sense. Exercises throughout the year help train your muscle memory to work through the breach and response.
6 steps for creating your incident response plan
An incident response plan can provide a solid foundation for your future security efforts. Here’s how to get started.
More from my site
- Ransomware, healthcare and incident response: Lessons from the Allscripts attack
On January 18, 2018, at around 2:00 a.m. EST, the security operations center (SOC) at electronic health record (EHR) and practice management software provider Allscripts detected […]
- 10 essential steps to improve your security posture
It has never been easier for cybercriminals to infect your business with malware or ransomware. A vast array of malware tools can be bought on the dark web, complete with helpdesks for […]
- The 7 deadly sins of endpoint detection & response
Many different elements need to come together for an organization to secure its data properly. Most companies adopt a security strategy that focuses on prevention, but the idea that you […]
- 5 steps to create a zero trust security model
The zero trust approach to enterprise security proposed by analyst firm Forrester Research nearly a decade ago can be challenging to implement. You need a clear understanding of the […]
- Data breach fatigue requires better response planning
With the number of data breaches reaching record levels and expected to rise, companies and consumers alike are trying to navigate a new reality where data theft is a common occurrence. […]
- Moving apps to the cloud? 3 steps to ensure good customer experiences
Many businesses today are moving customer-facing websites and applications to the cloud—and rightfully so. Cloud computing allows enterprises to reduce infrastructure costs and […]
- 8 steps to regaining control over shadow IT A dangerous practice on the riseImage by Pexels“Shadow IT” refers to the too-common practice whereby managers select and deploy cloud services without the consent or even the knowledge of […]
- TaskRabbit App Goes Down As It Investigates ‘Cybersecurity Incident’ TaskRabbit was taken offline on Monday while the company investigates what it described as “a cybersecurity incident.”
The online marketplace, which matches people who have stuff that […]
- 3 steps to take before deploying SD-WAN
As enterprises develop network strategies and technical roadmaps, one hot technology that will be on their radar is SD-WAN, a significant transformational solution in networking and a […]
- Apple’s bent iPad response is stunning, and a serious problem
If the new iPad Pro you got for Christmas is bent in the center, don’t bother booking an appointment at the Apple Store. Just return the tablet, because the genius at the bar […]