Victim of a data breach: what next? – EconomyMorning

Since the coronavirus pandemic has forced organizations to establish a remote working model and to rely more than ever on digital tools and processes, we have seen an upsurge in data breaches. According to the FBI’s annual report, France was thus the eighth most affected country in the world in 2020 in terms of the number of complaints filed. In this context, each organization clearly needs to be better prepared to respond to a breach and mitigate it effectively.

Cybersecurity basics

If an organization does not adhere to basic cybersecurity practices, it may not be able to effectively manage a data breach. This is because without knowing what types of sensitive data it holds, or where it is, or if that information is exposed due to excessive permissions, a business will not be able to quickly assess the scope of the incident. nor to block access. Therefore, it is essential to respect basic cybersecurity practices to be able to provide an effective response in the event of a compromise.. These include ensuring that sensitive data is kept in secure locations, eliminating overexposure, and revoking unnecessary access rights. Thanks to the visibility thus obtained, the IT team of an organization is then able to quickly identify a violation, analyze the context in which it occurs, and take the necessary measures to remedy it. .

Detection capabilities

Cybercriminals have grown rapidly in sophistication over the past year, according to a recent report from Microsoft, using techniques that make them harder to detect. This is a worrying finding, because the longer data breaches escape detection, the greater the consequences for an organization. Therefore, it is imperative that the incident response strategy includes measures that allow an organization to identify an intrusion in real time. The detection of security incidents therefore needs to be automated; because it will allow a business to determine the best response more quickly and minimize potential damage. So, according to one of our reports, organizations with automated processes to monitor data sharing were able to detect security incidents within minutes (48%), while those who did not have this type of process spent days (56%) or even weeks (22%).

An actionable incident response program

Part of the incident response program (or IRP) is probably available on the company intranet. This documentation usually contains rules, standards and procedures. However, it is extremely important that this program is known to all employees, so that it is carried out correctly. This includes ensuring that the roles of the different actors in the organization are clearly defined in the program, which means that everyone is familiar with their duties and responsibilities. In addition, it should also be ensured that all employees are trained and aware of what to do if they notice a security incident. In addition, this will allow the company to limit the risk of data breaches due to human error, as employees will better understand the damage that can result from a simple error. In addition, employees must be able to report a security incident to the appropriate people, and know who will take responsibility for responding to that breach. Finally, any IRP must be tested in a real situation. This will allow an organization to identify and remedy any technical or communication gaps, so that in the event of an incident, the response will be smooth.

Learn from one’s mistakes

If information has been lost or damaged as a result of a compromise, it is essential to prioritize the recovery of key data. But in any case, it is also essential to focus on organizational recovery in order to guarantee a return to normalcy as quickly as possible. Once this step is complete, the final step will be to incorporate the lessons learned from the data breach into the organization’s security strategy. This includes in particular the identification and elimination of any security vulnerabilities at the origin of the breach, as well as the potential problems in the procedures in place, in order to limit the risk that the attackers will operate in the same way again. .

Data breaches are inevitable, especially as the “cyber pandemic” continues. Faced with this reality, organizations must remain on permanent alert. However, if organizations heed these few tips and equip themselves with easy-to-use detection tools, they will be able to limit losses from data breaches.