It happened. Your business just suffered a cybersecurity attack. It’s easy to feel somewhat helpless after your organization has been terrorized by a security breach, but you don’t have to feel like a sitting duck for the next one.
Whether it was a major incident or an isolated occurrence, chances are you are ready to invest in mitigating an attack from happening again.
While most SMB business owners will say that they are concerned about their information security risks, more than half (51%) of those organizations are not allocating any budget/time to mitigating those risks! It isn’t until after a breach occurs that many businesses really review their information security posture.
Most articles you'll find regarding steps to take following a breach are about the standard crisis management steps a business should go through.
While these steps are crucial to ensuring you can recover from the breach, we want to talk about the most important step…. future vulnerabilities.
Recovering from a security breach takes an immense amount of time, money, and resources from your organization. Because of this, many organizations don’t finish the last step of assessing their vulnerabilities and making a plan to start addressing them. But this is the most important step to help prevent a security breach from happening again, or at least make it far less painful next time.
We know, you probably just spent a tremendous amount of time and money to get your organization back and the last thing you want to do is “relive” the chaos the security breach caused. However, by assessing the damage, the true impact (cost) to your organization, as well as documenting the processes you just developed (even if they were “on-the-fly”), you’ll have a great start to your future information security policy.
*Deloitte Advisory’s Cyber Risk Services, “Beneath the surface of a cyber attack: A deeper look at business impacts”
Many times, after an organization has suffered a security breach, the fear of another one can lead executives to make somewhat irrational decisions. Sometimes this results in investing in ‘quick fix’ security solutions that end up costing a lot of money but don’t really fix the problem. And unfortunately, many organizations are willing to take advantage of that pain just to sell you something.
Evaluate where you believe your biggest risks are. Whether your breach was an internal technical vulnerability such as a missing patch or update, a personnel vulnerability such as phishing or ransomware; or the breach was a result of a physical attack such as a stolen laptop or key fob, your natural instinct will be to plug that hole first. However, it may not be your biggest vulnerability. You may not even know where to start — hiring a 3rd party risk analysis or assessment team may be your first order of business. Finally, review your budget to allow investing in decreasing your risk in those key areas.
You can’t fix all your security vulnerabilities overnight. Deploying the proper security tactics requires a healthy mix of time and financial investment. Providers that urge you to invest too much up front or too little over too long are not looking out for your best interest. Your information security should be a part of your long-term strategy; therefore, part of your annual IT budget and plan.
So how do you realistically prioritize?
At this point, you may be feeling overwhelmed. The technology and security of your organization are complex, and you may be wondering if you have the right team of resources for the modern cyber-security landscape. Whether your IT department is in-house, or you subscribe to managed IT services, you’ll want to ensure your team has the knowledge, expertise, time, and skill-set to help you assess, build, and execute your information security goals.
Remember, your information security is not just a technical challenge. Too often, the decisions regarding the security of the organization are left to the IT manager or consultant who does not possess the deeper understanding of the business’s operations. A mature managed services consultant or IT analyst will have the business acumen necessary to provide recommendations that truly encompass the entire organization’s risk.
As the cyber-security landscape continues to evolve, you’ll never be 100% protected from another security breach or attack. However, understanding your organization’s risks, and having a plan to continually improve your security posture,will not only better protect you, but it will also help you recover faster and with far less impact to your organization.