How seriously does your business take IT security and what would you do in the event of a breach?
A number of recent hacks would suggest that businesses should be considering these questions.
In Australia, for example, the systems of the NBN provider platform networks were recently compromised by the self-taught hacker called Evil, allegedly an unemployed truck driver.
And in the US, Sony’s PlayStation network was compromised by the hacking group LulzSec, which released thousands of the network’s user names and passwords.
Other wounds have been self-inflicted. Dropbox, for instance, fell victim to its own programmers, who accidentally allowed anyone to log into its accounts without a password.
What these events demonstrate is the widening array of digital threats, from lone operators, from organised groups and from internal mis-administration.
For businesses serious security breaches can have disastrous effects, ranging from damaged reputations to complete operational disruption.
So what can you do if your systems fail you and you find yourself the subject of a breach?
The proper response is all about crisis management.
Have a plan beforehand
Getting hacked can be a dramatic event. By developing a set of guidelines in the cold light of day as to how you will react, you will limit the number of decisions you’ll have to make in the heat of the moment.
Outline the process you intend to follow and make sure you understand what, if any, requirements you’re subject to under the Privacy Act.
Stop the attacker
Once you’ve realised an attack is on your first task is to put a stop to it.
How you do this will depend on the nature of the attack, whether you think the hacker still has access to your systems and whether he/she might have compromised other areas of your network.
Understand what’s happened and how
This can be a labour intensive process and might require outside expertise, but you need to be certain how the attack succeeded if you want to stop it from happening again. Understanding the scope of the potential breach will also help to focus your response.
Inform your customers
For any business this is the most important part of handling a breach.
A 2010 Symantec study found that customer turnover was the single biggest cost of a data breach. It also found that businesses often overreact when customer data is breached by quickly informing their customer base at large rather than waiting to concentrate on the customers who are directly affected.
How you react will be a judgement call. If you want to involve police the Office of the Australian Information Commissioner recommends being careful not to compromise police investigations by making the details of the hack public too early.
Keep the information flowing
Once you’ve gone public about a hack a certain amount of reputational damage is unavoidable.
You might feel the urge to drop off the radar, but failing to provide an ongoing stream of up-to-date information to customers and media is a sure way to compound the damage.
Your business will be judged equally on how you respond to the hack as much as the hack itself, if not more so.
The key to avoiding all the above is to act to strengthen your security before you’re targeted.
There are numerous applications, services and devices that can help to stop intrusions into your network and to proactively search for breaches as they occur. Be sure that you’re considering using them.
Dave Stevens is managing director of managed IT services business, Brennan IT. For more information visit www.brennanit.com.au.
COMMENTS
SmartCompany is committed to hosting lively discussions. Help us keep the conversation useful, interesting and welcoming. We aim to publish comments quickly in the interest of promoting robust conversation, but we’re a small team and we deploy filters to protect against legal risk. Occasionally your comment may be held up while it is being reviewed, but we’re working as fast as we can to keep the conversation rolling.
The SmartCompany comment section is members-only content. Please subscribe to leave a comment.
The SmartCompany comment section is members-only content. Please login to leave a comment.