What to do If You Suffer a Cyber Security Breach

16 Mar 2016

What to do If You Suffer a Cyber Security Breach

A breach of an organisation's cyber security can have devastating financial and reputational repercussions. In this article, we take a look at what you should do if you discover that your organisation has suffered a cyber security breach.

1.Stay Calm –  In cyber security incidents you can’t outrun a machine and by the time you discover a breach, it’s probably been going on longer than you realise – don’t make any rash decisions. If prepared invoke Incident Response and business continuity plans. If in place or not, it’s important to make a decision as to whether to deal with the issue internally (often depends on available skilled resources) or to bring in a 3rd party incident management team like PGI Cyber’s Computer Incident Response Team (CIRT).

2.Identification – When alerted start to document timelines and findings as well as actions when taken. Bear in mind that in the event of a breach that the attacker may be elsewhere within your organisation which may require further investigations.

3.Containment – Prevent the attacker from doing any additional damage without alerting them to the discovery where possible. Patch out of date hosts, update  your perimeter device rules and policies. Once contained start to investigate whether other devices may be affected and look at business continuity measures where needed. This may depend on the business impact of the breach.

4.Eradication – Remove the attacker and any underlying indicators of malicious software or code from affected hosts, this can be a decision of precision removal or re-building of devices (wiping the machines) and perform account hygiene across the estate.

5.Recovery – Monitor the network for signs of any identified indicators that may return and ensure that changes made on the network have not had any unforeseen consequences. You may at this point discover the attacker had additional footholds in your organisation, in which case return to stage 2.

6.Lessons Learnt – identify what caused the breach, any problems that occurred during the incident response process and develop mitigating strategies to deal with any identified risks and issues moving forward. PGI can assist with all of this. 

Have you suffered a breach or suspect that may have been breached? Call  PGI Incident Response  on  +44 (0)1454 451801

For the latest PGI updates like our pages on LinkedIn –  PGIPGI Cyber  and Facebook –  PGIPGI Cyber

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP