What Should You Do If Your Business Is Hacked? (£)

Unfortunately hacking is now part of the current culture and around 85% of businesses worldwide have been hacked in one form or many.

Most Boards have decided not to discuss these issues outside of their security, computer, IT or Board rooms and believe that the PR issues involved are more damaging than the actual attacks themselves and they have decided to keep the issues media quite.

Much as this might make sense to the Directors of banks, consultancies, insurance businesses and retail operations, to name only a few, the issues should be broadened internally in order to engage with potential solutions that cross security boundaries.

Over half of CIOs interviewed say that they have reported a large increase in hacks in 2015 and that they do not yet see this decreasing. But of course reporting this to the Board is not positive and often there is a mistaken belief that therefore the CIO and CSO are to blame within the organisation and so the IT Management has reduced the number of times that they report cyber incidents to the senior management as they do not want to put their jobs at risk.

For instance the retailer, Target in 2013 was attacked by a memory-only Trojan, then the hackers stole over 40 million credit card numbers, phone numbers, addresses and security codes. Trojan computing is malicious software that is delivered by appearing to be a normal attachment to an email where information is asked, for it to be filled in, or new information downloaded.

This of course is only one recorded incident of many and it is important to understand from your own industry point of view what the current attacks are like and what specialists say are the best ways of reducing risk and acting if an attack happens.

Currently, in the US, healthcare, financial services and higher education sectors are particularly vulnerable to data breaches. These attacks were caused by malware or hacks. 

And so what should you do as part of the Board – first you should discuss these issues more broadly and gradually get into the detail once you have also done some background research, concerning the areas of business that you are involved in, and where the hacking attacks are most likely to focus upon.

Form a cyber comprehension club/department and get employees and Directors and management from different parts of the organisation to take part. Discuss the ways in which systems in your industry get attacked, experience theft and shutdowns and what the best methods for security that are currently being used.

Clarity of the issues and discussion of the required and potential security initiatives would significantly help to reduce the potential of attack and the effects and resolutions once attacks take place.

« Islamic State Recruits Indian Hackers
Ukraine - More Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Mitre ATT&CK

Mitre ATT&CK

MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.

Infopulse

Infopulse

Infopulse is a global provider of Software Engineering, Cloud & IT Infrastructure Management, and Cybersecurity services.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

Cisco Networking Academy

Cisco Networking Academy

Cisco Networking Academy is the world's largest classroom, bringing technology education, 21st-century skills, and improved jobs prospects since 1997.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.