Recently, several healthcare providers reported breaches that impacted thousands of their patients and caused untold financial damage:
Considering that the number of data compromises has been steadily rising—in 2021, 23% over the previous all-time high, says the Identity Theft Resource Center—it’s not a matter of if but when an organization gets hit with an attack. This raises an important question: What should you do in the wake of a data breach?
Here are some post-data breach do’s and don’ts to keep in mind.
In the moments and days after a breach, it’s essential to keep everyone in the organization calm. The key is to mitigate, not exacerbate, the damage.
Resist the urge to “shoot from the hip,” making decisions based on gut instinct, frustration, anger, or embarrassment. Your incident response plan was created for this moment—to provide a set of logical steps that will guide the remediation process. If you don’t yet have a plan, however, as soon as the dust settles, take the time to formulate one.
Even with a comprehensive observability platform monitoring your digital infrastructure 24/7, it’s best to leave root cause analysis to the professionals. They know what to look for, how different types of malware behave, the systems that are the most likely targets, and how to do a post-mortem analysis that reduces the possibility of another attack.
A chart outlining which stakeholders have been affected can inform both your communications strategy and mitigation efforts. At a minimum, your chart should include the following:
After the attack has been addressed, have someone take notes about:
These data points can then be used to create or refine and customize your incident response plan, ensuring it fits both your technical infrastructure and organizational culture.
The don’ts are just as important as the action steps above. Some things you absolutely should avoid doing right after a breach include the following:
The biggest mistake you can make is to resume operations right after a breach. Instead, take a step back to learn lessons and adopt strategies to better safeguard your organization. For example, you should:
The longer you wait to inform those affected by the breach, the worse the damage can get. If payment data was stolen, your customers should be informed right away so they can take steps to secure their accounts.
Letting key stakeholders know as soon as possible also insulates your reputation to some degree. For instance, if investors find out weeks after a breach that your defenses had been compromised, they may feel you're trying to hide something. It’s better to be transparent and release accurate information in a timely manner.
Exercise caution when providing information about what happened. You don’t want to tip off another attacker. While you want to come across as transparent, especially when dealing with the public, there’s no harm in withholding sensitive information regarding:
By keeping these details close to the chest, you minimize the chances of the hacker or their team using the information for a follow-up attack. Also, if it was an insider attack, you don’t want the criminal to know you’re on to them before authorities are able to make an arrest. In this way, you reduce the chances of them covering their tracks to avoid prison time.
By following the above do’s and don’ts, you can minimize the impact of a breach and make the recovery process faster and less expensive. More importantly, you can better protect your organization from the next attack.
For questions on how to safeguard your organization against data breaches, reach out to the IronNet team today.