Cyber-Attack — How to Manage them 10 steps

Cyber-Attack — If you have not been faced by one the odds are you will be

Cyber-attacks are now an everyday event and it is only a matter of time before your company faces one if it has not already. Cyber criminals are ubiquitous and attacks will continue despite our resolute attempts to stop them – even organizations with the best defenses in place are not immune. CIOs and CSOs need to accept these risks as fact and be prepared to respond quickly and effectively.

Managing cyber breaches starts before the breach occursCyber-Attack Security Manual

  • Perform a security data audit
  • Conduct endpoint security analytics
  • Determine the extent of exposure
  • Understand the capability of the malware or attack
  • Collect data for post event analysis
  • Implement long term solution
  • Adjust monitoring protocols
  • Post Mortem Analysis
  • Activate Incident Communication Plan(see https://www.e-janco.com/Incident-Communication-Plan-Policy.html)
  • Document results and keep them up to date

Author: Victor Janulaitis

M. Victor Janulaitis is the CEO of Janco Associates. He has taught at the USC Graduate School of Business, been a guest lecturer at the UCLA’s Anderson School of Business, a Graduate School at Harvard University, and several other universities in various programs.