Data Breach Occurred at Your Company? Now What?


Have you ever thought about what you would do if a data breach occurred at your company? Do you have a plan of attack if it does? Many business owners believe an actual data breach won’t happen to them and therefore don’t prepare for one. With cybersecurity threats on the rise, it isn’t a question of if it will happen but when.

Many companies are aware of the risks that come with these breaches and take the steps necessary to prevent a data breach from happening, but nothing is completely infallible. Big name companies such as Target, Home Depot and Twitter are just a few well-known companies that have fallen victim to security breaches.

To start with the basics, let’s go over what a security breach actually is. It’s any sensitive, protected or confidential data that has been viewed, stolen or used by unauthorized personnel. With that being said, read on for a few tips from DirectPointe and DirectPointe’s CEO, James Martinos, to apply if a data breach ever occurs at your company.

1. Identify the Root of the Issue

First and foremost, you need to address the issue immediately, without delay. Find the root of the breach and plug the hole. Then determine what was stolen. It’s important to determine where the breach started and then consult with your IT team immediately after for the next steps. If possible, move all compromised equipment offline but don’t shut down your machines. Then add clean machines in their place to prevent the data breach from spreading.

2. Form a Task Force

It’s worth considering bringing in a third party IT provider in the case of a data breach. If you have a current IT provider, the data breach occurred on their watch. Having a third party company assess the cause of the breach is best. DirectPointe has over 30 years of experience in advanced technical support services and systems management. DirectPointe has assisted many companies with serious technical issues such as data breaches and developing backup and recovery processes.

It’s better to have a plan in place before a breach occurs so you know what steps and processes you will take to solve the issue effectively when it happens. Doing a “pen test” aka penetration test is the most effective way to find gaps in your security. Penetration testing is the practice of testing a computer system, network or Web application to find weaknesses that a hacker could exploit. Contact us for a free quote and consultation.

3. Ensure it Doesn’t Happen Again

After a data breach, change all company passwords. It’s better to be safe than sorry by changing every company password in this situation. Changing every password is the best way to ensure another data breach does not occur. It is important to change all your passwords, even the uncompromised ones. To learn how to create strong passwords that are easy to remember check out our “First Line of Defense: A Strong Password” post here.

4. Notify Outside Parties

It’s best to notify outside parties. It could be the customers and/or clients affected, the public relations department or local authorities, but contact thme as soon as possible. It’s important to do this early in order to avoid further backlash and to show that you have nothing to hide. Majority of states have laws set in place that determine timetables of when to inform those affected or other prominent parties, so be sure to review those guidelines first.

Conclusion:

With up to 51 records stolen per second, you’re not the only one at risk. Don’t be an unprepared company that falls into the hacker’s trap. Call DirectPointe and/or connect with us on Facebook or Twitter to learn more about how to better protect your company from a costly data breach.

Want To Increase Your Tech Security?

Not sure if you’ve done everything possible to prevent a company data breach? Want to increase your tech security? Get help now with DirectPointe! For 100% US Based technical support, enter your information to be contacted and receive a free consultation now.

Request A FREE Assessment!

To Share

Leave a Reply

Your email address will not be published. Required fields are marked *