{"id":89546,"date":"2019-06-17T09:00:39","date_gmt":"2019-06-17T16:00:39","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89546"},"modified":"2023-05-15T23:03:32","modified_gmt":"2023-05-16T06:03:32","slug":"how-to-recover-from-a-security-breach","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/06\/17\/how-to-recover-from-a-security-breach\/","title":{"rendered":"How to recover from a security breach"},"content":{"rendered":"
Experts estimate that ransomware attacks are up over 600 percent. For most companies, the issue isn\u2019t if a cyberattack is going to happen, but when. Some security experts advise that the best way to recover from a security breach is to plan for it before it happens.<\/p>\n
Today we take you through:<\/p>\n
It\u2019s natural to focus on technology and systems during a cyberattack, but it\u2019s just as important to understand how your business is going to respond to the event\u2014internally, to your customers, and to the general public. How do you escalate information and to whom? You often need to integrate input from communications, operations, IT, finance, and other departments. That\u2019s why creating a plan is so important. You want to make sure you can respond quickly and have the right outcomes for your business priorities.<\/p>\n
You also need to identify the impact on your systems. Understanding the technology impact during a breach often involves coming up with an internal security operations center (SOC) process flow, decision trees, and a communications escalation process that identifies when you get information, who is told about it, when are they told, and what they need do about it. We often place information into different categories to give us the opportunity to identify information and the business the chance to think things through and build the plan before there\u2019s an actual incident.<\/p>\n
Companies that contain a security breach in less than 30 days can save millions of dollars. That\u2019s an incentive. But the impact of a breach is more than just financial\u2014it impacts your reputation.<\/p>\n
Here are four tips for responding to customers in an efficient, thoughtful way that can mitigate the damage of the attack:<\/p>\n
Increasingly companies are expected to think about their customers beyond their specific relationship and consider how a data compromise impacts a customer\u2019s relationship with other companies and accounts.<\/p>\n
The modern threat landscape is growing in sophistication and volume. As everything is becoming more digitized, there are more ways for bad actors to harm your company.<\/p>\n
Here are some best practices that you can use to monitor your environment and combat threats:<\/p>\n
Visibility is a key component to effective cybersecurity and monitoring.<\/strong> This includes having a good SOC and visibility into mobile users, remote workers, and business partners. The more you know about what\u2019s happening on your network, including the cloud, the more effectively you can safeguard your environment.<\/p>\n Cyber hygiene and up-to-date security tools are necessities for businesses of all sizes.<\/strong><\/p>\n For more detail on actionable tips from security experts on how to recover after a data breach, watch the video, How to recover from a security breach<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" Actionable tips from security experts on how to prevent, mitigate, or recover from a cyberattack.<\/p>\n","protected":false},"author":96,"featured_media":89547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3674,3684],"products":[],"threat-intelligence":[],"tags":[3742,3822,3809],"coauthors":[1916],"class_list":["post-89546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-best-practices","topic-incident-response","topic-security-operations","tag-azure","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\n\n
Get started<\/h3>\n