Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity

    Data Breach Lessons Learned From the Trenches

    By
    Chris Preimesberger
    -
    August 27, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Data Breach Lessons Learned From the Trenches

      1 - Data Breach Lessons Learned From the Trenches

      by Chris Preimesberger

      2Everyone Is Vulnerable

      2 - Everyone Is Vulnerable

      Every sector is susceptible to a data breach, and when cyber-criminals find vulnerabilities, they will use them time and again to attack similar industry organizations. Organizations can significantly reduce the costs and reputational fallout by having a strong IT security posture, chief information security officer (CISO) or outsourced IT consultant, and an incident-response plan. The response plan, similar to a fire drill, should be practiced and backed by a team that includes C-suite executives, IT, legal counsel, forensics, breach resolution providers, public relations and human resources.

      3Listen to the Experts and Follow Instructions

      3 - Listen to the Experts and Follow Instructions

      When an organization employs a collaborative process, the response usually has a much better outcome. That means IT professionals should be actively listening to breach experts, such as forensic teams, breach resolution providers, privacy attorneys, and public relations or crisis communication consultants. After all, these firms walk, talk and breathe data security and data loss every day.

      4Establish a Leader

      4 - Establish a Leader

      It is important that a company’s response team have a lean approval chain in place, with key owners and approvers established in advance of an incident. During a crisis, there are often several viewpoints to be considered, but ultimately a decision must be made to move the response forward. For efficiency, one person, or a small group, should be identified as the delegated authority to make executive decisions and articulate questions or concerns quickly up the chain of command.

      5Identify and Vet Partners

      5 - Identify and Vet Partners

      Identifying and vetting third-party data breach partners ahead of an incident is critical to ensuring they understand an organization’s business and can engage quickly. Consider pre-breach agreements with partners that include forensics firms, legal counsel, print and call center providers, credit-monitoring services and public relations agencies to ensure greater response alignment and reduce the likelihood of changing partners midstream, which can prove devastating to an organization’s response following a breach.

      6Know the Industry and Risks

      6 - Know the Industry and Risks

      To properly prepare for a breach and drive adequate response, companies should ensure that their data breach response plan outlines high-impact incidents based on the type of information they collect, their industry sector and operating countries. Organizations should conduct research and audit how industry peers have handled relatable breach incidents. For example, in the retail sector, organizations should evaluate recent payments breaches and plan for a similar scenario.

      7Investigate First, Talk Later

      7 - Investigate First, Talk Later

      Many organizations feel pressured to communicate to their customers as soon as they discover a breach. Don’t be hasty and induce panic among consumers, which can lead to poor decisions and crucial mistakes. Instead, when possible, complete the forensic investigation before announcing the breach, so the company can communicate the most accurate information and appropriate remediation steps.

      8Communicate Effectively and Accurately

      8 - Communicate Effectively and Accurately

      Communication to media, regulators, customers and partners is often center stage during a breach response; if done improperly, it could significantly harm a company’s corporate reputation. In an organization’s outreach to the breach population and key external stakeholders, send clear, honest breach notifications, provide credit monitoring or identity theft protection for customers, and keep an open line of communication.

      9Rebuild Customer Trust

      9 - Rebuild Customer Trust

      Don’t forget about the people affected by the breach: customers, patients or employees. They aren’t just a checkbox on a response plan. Remember, those stakeholders are most likely to call the media, litigators or perhaps switch to the competition. Identify the demographics of the company’s affected customers to anticipate potential roadblocks. For instance, do the data breach notifications and/or call center support multiple languages? A company’s response to an incident should keep the customer top of mind.

      10Don’t Shun Regulators

      10 - Don't Shun Regulators

      It’s in an organization’s best interest to develop relationships with regulators before suffering a breach. While customers are a key stakeholder group, communications and compliance with regulators and policymakers at both the state and federal levels should be taken seriously. Developing a meaningful dialogue while engaging them openly and transparently to provide timely answers to any questions they pose is critical to a company’s long-term response strategy.

      11Consider Cyber Insurance

      11 - Consider Cyber Insurance

      With the growing awareness of data breaches, it is no surprise more organizations are evaluating and investing in cyber insurance, and the number of companies purchasing these policies continues to grow. The 2013 Betterley Report estimates $1.3 billion in annual premiums on cyber and privacy insurance policies were collected by U.S. insurance companies in 2013. Investing in cyber insurance can help organizations reduce the cost of a breach and provide added benefits to a company’s security posture via access to data breach experts or other valuable services.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×