SlideShare a Scribd company logo
Successfully Protecting Your Organization's Brand Image
If you suspect a data breach, your goal is clear: stop information from being
stolen, and repair your systems so it won’t happen again. The following 5
steps will help you successfully stop information from being stolen, mitigate
further damage, and restore franchise operations as quickly as possible.
OF BREACHES INVESTIGATED BY SECURITYMETRICS FORENSIC INVESTIGATORS:
A BUSINESS TYPICALLY LEARNS THEY’VE BEEN BREACHED IN ONE OF FOUR WAYS:
33%Food Services Retail Trade Hospitality
29% 10%
HOTELHOTEL
A bank
informs you
Law
enforcement
Discovered
Internally
A customer's
complaint
DO YOU SUSPECT A DATA BREACH?
consulting@securitymetrics.com
801.705.5656
ISOLATE THE AFFECTED SYSTEM(S) TO PREVENT FURTHER DAMAGE.
CONTAIN
THE BREACH3.3.
Implement your IRP
Disconnect from the Internet
Document the entire incident
Disable remote access capability and wireless access points
Change access control credentials (usernames and passwords)
Segregate all hardware devices in the payment process
Quarantine instead of deleting (removing) identified malware
Preserve firewall settings, firewall logs, system logs, and security logs
Restrict Internet traffic
Contact your merchant processing bank
Consider hiring a law firm experienced in managing data breaches
2.2.PRESERVE
EVIDENCE
WHEN YOU OR YOUR FRANCHISEES DISCOVER A BREACH, REMEMBER:
Don’t panic
Don’t take any hasty actions
Don’t wipe and re-install your systems (yet)
Do follow your incident response plan
START YOUR
INCIDENT RESPONSE PLAN1.1.
Assemble your Incident Response team immediately
Inform franchisees of your IRP
Teach franchisees of immediate and long-term actions
4.4.CONSIDER PUBLIC
COMMUNICATIONS
Determine how and when notifications will be made
Know legislated mandatory time frames
Identify who is responsible for public statements
Seek the guidance of your legal counsel
Don't allow employees to announce the breach
Craft specific statements that target various audiences
INVESTIGATE, FIX YOUR
SYSTEMS, AND IMPLEMENT
YOUR CYBER INSURANCE PLAN5.5.
BRING AFFECTED SYSTEMS
BACK ONLINE
Ensure all systems have been:
Hardened
Patched
Replaced
Tested
SET YOUR BREACH PROTECTION
SERVICES INTO MOTION
Breach protection services can reimburse for:
Forensic investigation fees
Notification costs
Card brand fines
REMEMBER, PRACTICE REDUCES PANIC!REMEMBER, PRACTICE REDUCES PANIC!
© 2016 SecurityMetrics

More Related Content

PPTX
Website security
PPTX
Tips for Securing Your Workstation
PDF
CYBER ATTACK RECOVERY GUIDE
PPTX
LTS Secure offers PIM User Activity Monitoring
PDF
What Does a Data Breach Cost?
PPTX
Computer security
PPTX
Priviledged Identity Management
Website security
Tips for Securing Your Workstation
CYBER ATTACK RECOVERY GUIDE
LTS Secure offers PIM User Activity Monitoring
What Does a Data Breach Cost?
Computer security
Priviledged Identity Management

What's hot (18)

PPTX
Computer security b
PDF
Ri cyber-security-for-your-small-business
PPTX
Computer Security B
PPT
Ahearn Security Presentation
PPTX
Courion Survey Findings: Access Risk Attitudes
PDF
Security Operations Strategies
PDF
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
DOCX
Information security policy
PDF
Security Scare - Cybersecurity & What to Do About It!
PDF
Is Your Data Secure?
PPT
29386971 hacking
PPSX
BSA/AML Title 31 Software beyond compare!
PPT
DataPreserve- SEVRAR Jan 09
PDF
Ransomware Prevention Guide
PPTX
Phishing: How to get off the hook using Intelligent IAM
PPTX
10 Steps to Better Security Incident Detection
PPTX
Insider Threats: Out of Sight, Out of Mind?
PPTX
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Computer security b
Ri cyber-security-for-your-small-business
Computer Security B
Ahearn Security Presentation
Courion Survey Findings: Access Risk Attitudes
Security Operations Strategies
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
Information security policy
Security Scare - Cybersecurity & What to Do About It!
Is Your Data Secure?
29386971 hacking
BSA/AML Title 31 Software beyond compare!
DataPreserve- SEVRAR Jan 09
Ransomware Prevention Guide
Phishing: How to get off the hook using Intelligent IAM
10 Steps to Better Security Incident Detection
Insider Threats: Out of Sight, Out of Mind?
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Ad

Similar to 5 Steps to Manage a Data Breach (20)

PDF
Data Security: A field guide for franchisors
PDF
Data Breach Response: Before and After the Breach
PPT
Statewide Insurance Brokers - Cyber Insurance 101
PPT
FTC Protecting Info A Guide For Business Powerpoint
PDF
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
PPT
George Gavras 2010 Fowler Seminar
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PPT
Tips to Protect Your Organization from Data Breaches and Identity Theft
PPTX
Certified Banking TPM - Module 3 powerpoint presentation
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
Ways to Safeguard Your Business from a Data Breach
PDF
Cybersecurity a short business guide
PDF
Data Breach Response: A Guide for Business
PDF
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPSX
November 2017: Part 6
PPTX
Cyber security threats and its solutions
PDF
Treat a Breach Like a Customer, Not a Compliance Issue
Data Security: A field guide for franchisors
Data Breach Response: Before and After the Breach
Statewide Insurance Brokers - Cyber Insurance 101
FTC Protecting Info A Guide For Business Powerpoint
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
George Gavras 2010 Fowler Seminar
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
Tips to Protect Your Organization from Data Breaches and Identity Theft
Certified Banking TPM - Module 3 powerpoint presentation
CyberCare Pro - Cybersecurity for SME's updated.pptx
Ways to Safeguard Your Business from a Data Breach
Cybersecurity a short business guide
Data Breach Response: A Guide for Business
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
I’ve Been Hacked  The Essential Steps to Take Next
November 2017: Part 6
Cyber security threats and its solutions
Treat a Breach Like a Customer, Not a Compliance Issue
Ad

More from SecurityMetrics (20)

PPTX
Hipaa Reality Check
PPTX
Understanding the New PCI DSS Scoping Supplement
PDF
How to Effectively Manage a Data Breach
PDF
How to Secure Your Medical Devices
PDF
How to Prepare for a PCI DSS Audit
PDF
Medical Data Encryption 101
PDF
Securing Your Remote Access Desktop Connection
PDF
Window of Compromise
PDF
HIPAA PHI Protection: Where is Your PHI Stored?
PDF
The 5 Step HIPAA Risk Analysis
PDF
5 Documents to Prepare for a HIPAA Audit
PDF
Don't Let Phishing Emails Hook Your Empolyees
PDF
What's Causing You to Store Unencrypted Payment Cards?
PPTX
Auditing Archives: The Case of the File Sharing Franchisee
PPTX
Auditing Archives: The Case of the Evil Java Script
PPTX
Auditing Archives: The Case of the Overly Helpful Front Desk Clerk
PPTX
The Case of the Suspiciously Flawless Investigation
PPTX
The Case of the Mistaken Malware
PPTX
The Case of the Stockpiled Credit Cards
PPTX
What Does the End of Windows XP Mean For Businesses?
Hipaa Reality Check
Understanding the New PCI DSS Scoping Supplement
How to Effectively Manage a Data Breach
How to Secure Your Medical Devices
How to Prepare for a PCI DSS Audit
Medical Data Encryption 101
Securing Your Remote Access Desktop Connection
Window of Compromise
HIPAA PHI Protection: Where is Your PHI Stored?
The 5 Step HIPAA Risk Analysis
5 Documents to Prepare for a HIPAA Audit
Don't Let Phishing Emails Hook Your Empolyees
What's Causing You to Store Unencrypted Payment Cards?
Auditing Archives: The Case of the File Sharing Franchisee
Auditing Archives: The Case of the Evil Java Script
Auditing Archives: The Case of the Overly Helpful Front Desk Clerk
The Case of the Suspiciously Flawless Investigation
The Case of the Mistaken Malware
The Case of the Stockpiled Credit Cards
What Does the End of Windows XP Mean For Businesses?

Recently uploaded (20)

PPTX
Computer network topology notes for revision
PPTX
Introduction-to-Cloud-ComputingFinal.pptx
PDF
Mega Projects Data Mega Projects Data
PDF
Fluorescence-microscope_Botany_detailed content
PDF
Lecture1 pattern recognition............
PPT
Miokarditis (Inflamasi pada Otot Jantung)
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PPTX
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
1_Introduction to advance data techniques.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPTX
Data_Analytics_and_PowerBI_Presentation.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPT
Quality review (1)_presentation of this 21
PDF
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
.pdf is not working space design for the following data for the following dat...
Computer network topology notes for revision
Introduction-to-Cloud-ComputingFinal.pptx
Mega Projects Data Mega Projects Data
Fluorescence-microscope_Botany_detailed content
Lecture1 pattern recognition............
Miokarditis (Inflamasi pada Otot Jantung)
Galatica Smart Energy Infrastructure Startup Pitch Deck
Introduction to Basics of Ethical Hacking and Penetration Testing -Unit No. 1...
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
Introduction to Firewall Analytics - Interfirewall and Transfirewall.pptx
IB Computer Science - Internal Assessment.pptx
Supervised vs unsupervised machine learning algorithms
1_Introduction to advance data techniques.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Data_Analytics_and_PowerBI_Presentation.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Quality review (1)_presentation of this 21
Recruitment and Placement PPT.pdfbjfibjdfbjfobj
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
.pdf is not working space design for the following data for the following dat...

5 Steps to Manage a Data Breach

  • 1. Successfully Protecting Your Organization's Brand Image If you suspect a data breach, your goal is clear: stop information from being stolen, and repair your systems so it won’t happen again. The following 5 steps will help you successfully stop information from being stolen, mitigate further damage, and restore franchise operations as quickly as possible. OF BREACHES INVESTIGATED BY SECURITYMETRICS FORENSIC INVESTIGATORS: A BUSINESS TYPICALLY LEARNS THEY’VE BEEN BREACHED IN ONE OF FOUR WAYS: 33%Food Services Retail Trade Hospitality 29% 10% HOTELHOTEL A bank informs you Law enforcement Discovered Internally A customer's complaint DO YOU SUSPECT A DATA BREACH? consulting@securitymetrics.com 801.705.5656 ISOLATE THE AFFECTED SYSTEM(S) TO PREVENT FURTHER DAMAGE. CONTAIN THE BREACH3.3. Implement your IRP Disconnect from the Internet Document the entire incident Disable remote access capability and wireless access points Change access control credentials (usernames and passwords) Segregate all hardware devices in the payment process Quarantine instead of deleting (removing) identified malware Preserve firewall settings, firewall logs, system logs, and security logs Restrict Internet traffic Contact your merchant processing bank Consider hiring a law firm experienced in managing data breaches 2.2.PRESERVE EVIDENCE WHEN YOU OR YOUR FRANCHISEES DISCOVER A BREACH, REMEMBER: Don’t panic Don’t take any hasty actions Don’t wipe and re-install your systems (yet) Do follow your incident response plan START YOUR INCIDENT RESPONSE PLAN1.1. Assemble your Incident Response team immediately Inform franchisees of your IRP Teach franchisees of immediate and long-term actions 4.4.CONSIDER PUBLIC COMMUNICATIONS Determine how and when notifications will be made Know legislated mandatory time frames Identify who is responsible for public statements Seek the guidance of your legal counsel Don't allow employees to announce the breach Craft specific statements that target various audiences INVESTIGATE, FIX YOUR SYSTEMS, AND IMPLEMENT YOUR CYBER INSURANCE PLAN5.5. BRING AFFECTED SYSTEMS BACK ONLINE Ensure all systems have been: Hardened Patched Replaced Tested SET YOUR BREACH PROTECTION SERVICES INTO MOTION Breach protection services can reimburse for: Forensic investigation fees Notification costs Card brand fines REMEMBER, PRACTICE REDUCES PANIC!REMEMBER, PRACTICE REDUCES PANIC! © 2016 SecurityMetrics