So you've been hacked, now what?

The statistics would seem to suggest that it is less a matter of if and more when your enterprise will fall victim to a hack attack of some kind. Once you've been hacked, then what?

1. Verify that an incident has taken or is taking place.

2. Identify its scope and impact (is it a customer credit card database hack with data stolen or just defacement of a little used information portal).

3. Capture evidence of the attack and any ongoing activity (forensically image workstations or servers, take live analysis of compromised systems, collect logs for network infrastructure."

Advertisement - Article continues below

4. Stop any ongoing compromise.

5. Determine the extent of the damage and plan repair activity.

6. Determine the attack vector and plan remediation of defences.

7. Implement security updates to prevent re-compromise (apply patches, harden vulnerable server, improve firewall rules etc).

8. Implement repairs and restore service.

9. Analyse and investigate available evidence to determine attack timeline and confirm all compromised areas have been identified.

10. Compile evidence into report and pursue legal action.

Disclosure checklist (supplied by Prof John Walker of the ISACA):

If the breach has any actual, or potential to impact on Government Sensitive, or Marked Information Assets then call the relevant agency.

If Personal Information has been impacted which are subject to the controls under the Data Protection Act then consider the reporting channels.

If you have a Corporate Communications Division then consult with them so as to prepare for any potential of adverse reports, or press inquiries.

Advertisement - Article continues below

Always be aware of the relevant local, and International laws and legislations, and their impact on the situation. Report in accord under the guidance of your Corporate Communications Division.

Featured Resources

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Remote working 2020: Advantages and challenges

Discover how to overcome remote working challenges

Download now

Keep your data available with snapshot technology

Synology’s solution to your data protection problem

Download now

After the lockdown - reinventing the way your business works

Your guide to ensuring business continuity, no matter the crisis

Download now

Most Popular

How do you build a great customer experience?

How do you build a great customer experience?

20 Jul 2020
Labour Party donors caught up in Blackbaud data breach
data breaches

Labour Party donors caught up in Blackbaud data breach

31 Jul 2020
Why it’s time to expand beyond 16:9 monitors
Advertisement Feature

Why it’s time to expand beyond 16:9 monitors

21 Jul 2020