Managing the cybersecurity threat

It isn’t a matter of “if” or “when”, but as your company is being hacked, how can organizations respond to and manage the cyberthreats landscape. As Brian Krebs, one of the world’s leading cybersecurity journalists, said at a recent event “everything gets hacked!”, with businesses and IT professionals needing to start accepting the “depressing reality”. The proliferation of data breaches continues to surge. According to Cybersecurity Ventures, a data breach occurs every 14 seconds, down from every 40 seconds in 2016 and by 2021 will occur every 11 seconds.

With the current pandemic, the problems have not gone away for many organizations and IT departments, rather the contrary, they have escalated. No organization is exempt from the threat. Not even the World Health Organization (WHO). According to Flavio Aggio, Chief Information Security Officer, reports that cyberattacks on it (the WHO) have doubled in recent weeks including an attempt to steal passwords belonging to WHO agency staff.¹

Moreover, cybercriminals are taking advantage of the opportunity to scam, hack and cause chaos across the digital landscape. There has never been a time like the present for organizations to analyse their information resilience across areas such as cybersecurity, information management and privacy, security awareness programmes and compliance with regulatory requirement.

So, what should organizations do if they have a data breach?

Here are six important stages of a data security or data privacy breach. This will help enable incident response teams to proactively detect, manage and provide remediation to enhance their state of information resilience.

  • Preparing for a data breach: Have you put the right governance structure in place, with the correct resources and tool sets?
  • Identifying a data breach: Can your team respond to security alerts and determine if there has been a potential incident and ultimately a data breach?
  • Containing and eradicating a breach: Are there plans in place with the right resources to stop a data breach?
  • Recovering from a breach: How quickly can you restore operations to business-as-usual?
  • Post incident review: Are you systematically reviewing and identifying improvements from each incident?
  • Lessons learnt from a breach: Are you successfully implementing lessons learnt across the business?

Our team of trusted advisors can support your organization’s capabilities to respond to breaches at any time and find out now how we can help keep your organization secure, safe and sustainable during these vulnerable times.

Menu