Real Solutions. Expert Advice. Real Time.

phone handset icon CALL US TODAY | (877) 396-2300

image of lock in front of a background of binary dataYou never want to experience a cyber attack in your business. Thieves might steal valuable company information. They might also steal and abuse clients' personal information. Therefore, such losses could harm much more than just the company. So, if one strikes you, what should you do? Keep a few of these basic cyber attack response steps in mind.

The Threats of Cyber Attacks

It is hard to predict if or when a cyber attack might strike. However, with today's worldwide computer network, hackers thousands of miles away have devised genius ways to infiltrate networks and steal critical private information. Even the world’s largest companies are susceptible, and we’ve seen in multiple situations where hackers have stolen valuable information, including customers' identities.

Therefore, if your business experiences a major cyber infiltration, it could harm more people than just you. You therefore must spring into action immediately upon finding out a problem has struck.

Simple Steps for Security

There is no time to waste if you receive a notification of a hack, ransomware or virus attack. You must lock down your systems and start damage control immediately.

Think of a cyber attack like you would a rowboat that springs a leak. You need to plug and fix the leak as quickly as possible. Otherwise, you'll sink. The same goes for cyber-attacks. The sooner you can start to fix the problem, the more damage you will leave behind.

At minimum, you should take the following steps:

  • If hackers claim to be holding your data for ransom (ransomware attacks), do not pay. In many case, the ransom does not work. In others, you will get the data back, but hackers will still be able to target you again in the future.
  • Check your data servers. If you have backups of your information on other servers, then you might be able to use that data temporarily. That can help avoid business interruptions.
  • Immediately contact the party that manages your IT services. This might be an employee IT professional, or a third-party service provider.
  • You and your IT professionals should keep significant notes and evidence of the attack. That can help you file any insurance claims, or documentation with investigators.
  • You might need to engage other parties to help you manage damage control. For example, your HR department might need to notify employees of the theft and the next course of action.
  • In most cases, you have an obligation to notify clients about the attack. You might also have to contact certain regulators about the attack. Public relations groups might have to get involved to help you inform clients about the attack.

Most importantly, contact the party that provides your cyber liability insurance. They can often help you cover many of the costs related to the investigation and data recovery process. Don't forget to work in the aftermath attack to institute new data protection services to prevent future attacks.

Looking for Cyber Liability Insurance? Contact ProAccess today to learn more about coverage options to protect your business.

Also Read: Why Offering D&O Insurance Helps Your Business

Share |

No Comments

Post a Comment
Required (Not Displayed)

All comments are moderated and stripped of HTML.
Submission Validation
Change the CAPTCHA codeSpeak the CAPTCHA code
Enter the Validation Code from above.
NOTICE: This blog and website are made available by the publisher for educational and informational purposes only. It is not be used as a substitute for competent insurance, legal, or tax advice from a licensed professional in your state. By using this blog site you understand that there is no broker client relationship between you and the blog and website publisher.
Blog Archive
  • 2020
  • 2019
  • 2018
  • 2015

View Mobile Version

- Trusted Partners Of -

ProSight Specialty Insurance
Berkley Select
© Copyright. All rights reserved.
Powered by Insurance Website Builder