Share this
Preparing for Data Breach
by Sean Curiel on Nov 10, 2021 3:43:38 AM
We all hope that it's not a self-fulfilling prophecy. We must hope for the best, prepare for the worst, and not be surprised by anything in between (Maya Angelo). Solid preparation helps us to avoid a worst-case scenario with the devastating effects of a data breach. The immediate actions you take upon discovery of a data breach incident can facilitate a quick recovery, blunt financial and repetitional damage, and enable a fast return to business.
Types of Data Breach
From stolen passwords, phishing attacks, unpatched hardware, or malware, data breaches can occur in any number of ways. How you respond, in part, may depend on the type of business you are conducting. Customers, in government or highly regulated industries may need to follow a very specific flow of communication and notification to meet compliance standards, while Managed Service Providers may have to notify thousands of clients about actions to take and the status of service. But in all cases of a data breach, you will need to identify the problem, communicate internally (and externally), mitigate the damage, enact business continuity measures, recover data, and analyze how this event took place.
MSP Response to Data Breach
When a breach is first identified, an MSP must have a clear set of standard operating procedures. Leadership will be required to carry out important security actions.
- Define your business's emergency response team
- Designate appropriate roles and responsibilities
- Construct a hierarchy and contingency plan should a member be unavailable
Communications
Not only who will be notified and when, but also via what methods. Automation is great for fast effective internal notifications, but cannot always be relied upon. This makes documenting manual procedures an important backup course of action. Once your response group communications have been established, is your plan clear enough that anyone could understand it? As you take on new IT team members it may be worth seeing if they can explain what needs to happen from a company-wide standpoint based on your documentation.
What is your responsibility to your customer in a data breach scenario? Yes, you'll want to secure their data and communicate clearly, but these are very broad concepts. Every new customer relationship should include signed agreements or contracts that set the appropriate expectations and define the minutia of the MSP's responsibility to the client.
Finally, businesses may find their password software or other security tools become unavailable at the worst possible moment. Document your security procedures manually as a backup to any applications that control access during an emergency.
Conduct a Practice Run
Are you aware of the most common methods of attack? Look at your situation from a potential attacker's perspective and build out the most likely scenarios. A vast amount of knowledge can be gained by running through simple tabletop exercises that illuminate any foreseeable obstacles and address team concerns well in advance of a real problem.
TIP: Develop the 10 most likely data breach scenarios and run through 1 every quarter with team members in a simulated activity.
Scenarios should include the most common attacks, such as:
- Ransomware Attack
- Compromised Credentials
- Insider Leak
- Distributed Denial of Service (DDOS)
Should clients be involved in your breach response simulation? That's up to you. Will they see value in a partner who is taking every precaution to ensure the security of their data? Then by all means, show them the value you are providing and educate them on the actions they must take in a disaster scenario.
Response Plan
Your data response plan should define how your business halts the progress of a threat and maintains business continuity to critical systems. How will customers be notified? These types of notifications can be built out in advance to save critical time. Other communications might include authorities or cyber insurance contacts. As an example, regulations like GDPR require that a data breach be reported within 72 hours.
It is also often important to consider how this crime will be investigated, and recorded, and forensics eventually performed for legal reasons. At a minimum, your team should understand what actions to avoid that could interfere with an outside investigation.
Response planning should include the following steps:
- Categorize data and prioritize risk to critical data in the event of total loss, theft, or sabotage
- Risk assessment extends to applications, devices, and users
- Business continuity plan in the event critical services become unavailable
- Security policies and procedures that will contain threats (short-term / long-term)
- Eradication and remediation of threat (enhancing protection / removing vulnerabilities)
- How self-evaluation of security response will be conducted
Cyber Insurance
How liable are you during a data breach? There may be a range of requirements from your cyber insurance company that help to protect you during a data breach. Nobody wants to make a misstep that invalidates a potentially business-saving policy. Furthermore, these contracts should be reviewed annually to verify that no major changes have taken place that would require a policy update.
If at this point you are asking "Why do I need cyber insurance?", then we could discuss the obvious financial benefit in a ransomware extortion-type scenario. But more compelling is understanding how cyber insurance can work as a tool to close additional business and present your value to prospective clients. While all MSPs can promise the world to clients, fewer can produce proof of financial protection, and fewer still train with customers for a detailed response to data breaches.
New Regulations
MSPs especially must pay close attention to the latest industry regulations regarding protected personal information (PPI) as they could become targets for greater regulation or be found liable for damages. A recently passed Louisiana security law, for example, requires MSPs to register with the state and notify of any ransomware payments made.
It's important not to fall behind and stay diligent about internal procedures. When new hardware is deployed your breach response plan must also be updated to reflect it. These documents must not sit static but continue to evolve.
The NovaBACKUP Cloud team works with MSPs to build a clear course of action to restore critical data. Our backup-as-a-service solution has received the HIPAA Certification Verification from the Compliancy Group to ensure compliance with strict privacy regulations. We invite you to speak with one of our backup experts about testing NovaBACKUP Managed Backup in your environment today.
Share this
- Pre-Sales Questions (112)
- Tips and Tricks (95)
- Industry News (59)
- Reseller / MSP (37)
- Best Practices (30)
- Security Threats / Ransomware (30)
- Applications (26)
- Cloud Backup (25)
- Disaster Recovery (25)
- Compliance / HIPAA (24)
- Backup Videos (23)
- Storage Technology (23)
- Virtual Environments (17)
- Technology Updates / Releases (9)
- Infographics (8)
- Backup preparation (4)
- Products (US) (2)
- Company (US) (1)
- Events (1)
- Events (US) (1)
- October 2024 (1)
- September 2024 (2)
- August 2024 (1)
- July 2024 (2)
- June 2024 (2)
- May 2024 (1)
- April 2024 (1)
- March 2024 (2)
- February 2024 (2)
- January 2024 (1)
- December 2023 (1)
- November 2023 (1)
- October 2023 (1)
- September 2023 (1)
- August 2023 (1)
- July 2023 (1)
- May 2023 (1)
- March 2023 (3)
- February 2023 (2)
- January 2023 (3)
- December 2022 (1)
- November 2022 (2)
- October 2022 (2)
- September 2022 (2)
- August 2022 (2)
- July 2022 (1)
- June 2022 (1)
- April 2022 (1)
- March 2022 (2)
- February 2022 (1)
- January 2022 (1)
- December 2021 (1)
- November 2021 (1)
- September 2021 (1)
- August 2021 (1)
- July 2021 (1)
- June 2021 (1)
- May 2021 (2)
- April 2021 (1)
- March 2021 (2)
- February 2021 (1)
- January 2021 (1)
- December 2020 (1)
- November 2020 (1)
- October 2020 (2)
- September 2020 (4)
- August 2020 (2)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (3)
- February 2020 (2)
- January 2020 (2)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- August 2019 (1)
- July 2019 (1)
- June 2019 (1)
- April 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (2)
- August 2018 (3)
- July 2018 (4)
- June 2018 (2)
- April 2018 (2)
- March 2018 (2)
- February 2018 (2)
- January 2018 (3)
- December 2017 (1)
- September 2017 (1)
- May 2017 (2)
- April 2017 (5)
- March 2017 (4)
- February 2017 (1)
- January 2017 (1)
- December 2016 (1)
- November 2016 (1)
- October 2016 (2)
- September 2016 (1)
- August 2016 (3)
- July 2016 (2)
- June 2016 (3)
- May 2016 (7)
- April 2016 (8)
- March 2016 (1)
- February 2016 (3)
- January 2016 (12)
- December 2015 (7)
- November 2015 (5)
- October 2015 (6)
- September 2015 (2)
- August 2015 (3)
- July 2015 (2)
- June 2015 (2)
- May 2015 (1)
- April 2015 (5)
- March 2015 (3)
- February 2015 (4)
- January 2015 (2)
- October 2014 (5)
- September 2014 (8)
- August 2014 (5)
- July 2014 (8)
- June 2014 (4)
- May 2014 (3)
- April 2014 (9)
- March 2014 (7)
- February 2014 (7)
- January 2014 (5)
- December 2013 (4)
- October 2013 (7)
- September 2013 (2)