||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||| |||||||||||||||||||||||||||||||||| Digital Transformation
with your system means that if the worst does happen, they will be able to act immediately to help you contain and analyse the attack. They can also help you discover the facts
and take the right actions in the event of a ransomware demand.
Keep a record of events As soon as you realise your system has been attacked, keep a record of every subsequent action taken – such as who has touched the system, and when. This log will help you keep track of your
system, become a valuable resource for post-breach analysis, and will also help your organisation’s case in the event of any legal action.
Be honest with your customers Most organisations will worry about the reputational damage of disclosing a breach of sensitive data, but if your users’ data is out
there, they not only deserve to be notifi ed, but you could face legal action if you fail to do so. Once you have called in an expert, they will
work to understand the scope of the attack, close the security holes that have caused a problem and review your compromised fi les. If it is likely that the breach contained
personal information then, by law, this must be reported to the Information Commissioner’s Offi ce within 72 hours. Failing to do so can lead to a fi ne of up to £8.7m or 2% of your global turnover.
Rebuild After an attack, it is essential to submit your entire system to an extended security assessment. This can identify and fi x any other vulnerabilities in your system to help protect your business from a repeat incident. The UK government’s 2021 cybersecurity
review found only 15% of businesses have conducted an audit of their cyber security
In Focus
If it is likely that the breach contained personal information then, by law, this must be reported to the Information Commissioner’s Offi ce within 72 hours
vulnerabilities, and only 31% of businesses and 27% of charities have a business continuity plan that covers cybersecurity. Therefore, while cyber attacks are certainly on the rise – and it is important to know how to respond to a breach – there is still a huge amount of scope for businesses work with the experts to improve their cybersecurity strategy and greatly reduce their risk of falling victim to any form of attack. CCR
March 2022
www.CCRMagazine.com
31
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52