Cybersecurity | Cyber attack | Tips and Trends Hints
In the event of a cyber emergency, it is important to have a fast, deliberate response – incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.
First of all, we hope you never need an incident response. But as with all emergencies, cyber emergencies are better prepared to cope with them. We would like to contribute to this with this article.
If you know what needs to be done and have already made arrangements for your incident response, your company can get back to productive everyday life more quickly in the event of an emergency. At the same time, you can better keep calm in the hustle and bustle of a cyber emergency, act more thoughtfully and give others orientation.
Particularly important: The right, specialized contact persons
Cybercriminals often penetrate deep into the system they attack. For example, to make their ransom demand as unavoidable as possible through a comprehensive ransomware attack. Or to be able to attack again after an incomplete removal of the malware. Therefore, we strongly recommend that you consult appropriately specialized cybersecurity or IT forensics professionals in a cyber emergency.
Basic considerations for your company’s incident response
The best way to estimate how important good incident response is for your company is to do it yourself. What damage would a cyber emergency cause? For example: If all computers, servers, printers and other systems such as computer-controlled production lines fail. If you can no longer access your customer data or incoming orders no longer arrive in your system.
These considerations are rarely pleasant. But on the basis of this, responsible decisions can be made with regard to incident response. At the same time, these considerations help you to identify data and systems that are particularly worthy of protection.
How an incident response works
Good incident response takes place in three phases: before a cyber emergency, in acute cases and after a cyber emergency. The first phase is particularly important. Because all other measures are based on it.
Phase 1: Measures before a cyber emergency
This phase has a huge advantage: there is no time pressure. You can review and optimize your considerations and your approach at your leisure. Ideally, you will already be supported by specialized experts in the field of cybersecurity or IT forensics.
The key question is: How can damage caused by a cyber attack be avoided or reduced in the best possible way? Of course, the respective measures must be adapted to the specifics of your company. Many of them also have a preventive effect, i.e. they can prevent cyber emergencies.
Typical measures include:
Phase 2: Measures in acute cases
In the event of an emergency, it has to be done quickly. This is because cyber emergencies often cause production stops. However, many hackers rely on precisely this time pressure and “hide” parts of their malware in the system that are difficult to find. Therefore, thoroughness is also of crucial importance in acute cases.
Key measures of incident response in acute cases:
Phase 3: Measures after a cyber emergency
A cyber emergency must be documented and, in most cases, reported to the relevant authorities. It may also affect your customers or partner companies – who will then have to inform you. Last but not least, a cyber emergency shows you where your company’s cybersecurity should be improved.
Common measures taken after a cyber emergency include:
Our top 3 tips for your incident response
Do you have a cyber emergency or would you like to optimize your incident response with us? Then contact our experts at Perseus.
Would you like to take a closer look at the topic of incident response? Then request our free guide “What to do in a cyber emergency”. In it you will find significantly more information than fits in a blog article.