SlideShare a Scribd company logo
How to recover
from your next
data breach
Put Together a Response Team
A data breach demands a comprehensive response. Knowing who will be part of your response
team and assigning their primary tasks ahead of time will help you quickly take appropriate
action. The team should be enterprise-wide and include key members of the executive team and
board of directors, the head of IT, security experts, as well as representatives from your legal,
communications and HR departments.
It is important to remember that it is not just your company’s data that has been compromised.
Employees need to know what risk they are at and what they need to do. Vendors and clients
who were impacted need to be informed.
Having a comprehensive team in place will help create a multifaceted plan that addresses all the
issues a data breach may create.
Identify the Source and Spread
In the aftermath of an incident, you do not want to take any steps that
might spread the problem inadvertently. Keep focus on identifying the
source of the attack and isolate the affected servers and systems. Infected
machines should be analyzed to determine if a full operating system restore
is required or if they can be cleaned using anti-ransomware software. As
ransomwares like Ryuk evolve, creating a hierarchy of attack on a network,
this isolation becomes even more crucial. This latest generation of attacks
can be more effective, faster, and spread wider than those of the past.
Ensuring your team is educated and updated on the latest variants will help
them to know where to start looking once a breach occurs.
Think Before You Act
If a ransomware attack happens and employees find themselves locked out of
their data, the gut reaction may be to reload from backed-up files. That is what
they are there for after all. There is a good chance, however, that these files
have also been targeted by the attack, leaving them encrypted, unrecoverable
or also infected. Always train employees to scan backup files before attempting
a recovery.
Digital storage systems that enable point-in-time recovery can be invaluable in
reducing downtime from a ransomware attack that manages to encrypt data
and backup files. These systems enable security and IT teams to roll back to a
restore point before the infection, which should recover the bulk of the data in
a single step.
Since these systems track changes at the block level, they are able to recover
quickly. Back-ups of the most critical files and data should be kept in
air-gapped storage systems. This ensures that at least one copy of the data is
always housed on servers that are isolated from the network and will remain
unaffected by an attack.
Don’t Cover It Up
When it comes to data breaches of any kind, from a DDoS attack to malware, there can be a
perceived negative stigma. There may be fears that the breach will make your company look
careless and undermine the trust of clients and partners. There may be an impulse toward
keeping quiet. After all, if no one knows about it, it didn’t really happen.
The truth is these sorts of attacks are common. A breach is not a sign of corporate weakness, it
is an unfortunate reality of existing in the digital age. The worst thing you could do after a
breach is to keep it quiet.
In many cases, your company has a legal duty to notify law enforcement or privacy regulators.
Every attack needs to be understood so as to give White Hats a chance to bring equilibrium to
that ebb and flow of vulnerability.
Reporting is the first thing you can do to protect your organization from a subsequent attack.
In the aftermath of a breach, your company’s
leadership will be focused on cybersecurity.
That presents an opportunity for a
wide-ranging evaluation of your current
security practices, procedures and tools. Don’t
waste it.
Protect Your Network
from Another Attack
SILO Compliance Systems
1067 South Hover Street,
#E-172, Longmont,
Colorado, 80501

More Related Content

PDF
CYBER ATTACK RECOVERY GUIDE
PDF
Malware Attacks | How To Defend Organizations From It?
PDF
Securing Your Work from Home.pdf
PPTX
Assess risks to IT security.pptx
PDF
Cybersecurity risk assessments help organizations identify.pdf
PDF
Tech Talent Meetup Hacking Security Event Recap
PDF
10 Tips to Improve Your Security Incident Readiness and Reponse
 
PDF
How to Bulletproof Your Data Defenses Locally & In the Cloud
CYBER ATTACK RECOVERY GUIDE
Malware Attacks | How To Defend Organizations From It?
Securing Your Work from Home.pdf
Assess risks to IT security.pptx
Cybersecurity risk assessments help organizations identify.pdf
Tech Talent Meetup Hacking Security Event Recap
10 Tips to Improve Your Security Incident Readiness and Reponse
 
How to Bulletproof Your Data Defenses Locally & In the Cloud

Similar to How to recover from your next data breach (20)

PDF
How Can Cybersecurity Services Help Protect My Organization from Ransomware A...
PDF
In computer security, a vulnerability is a weakness which allows an .pdf
PDF
How to secure your enterprise data during Covid-19
PDF
Should You Pay Ransomware.pdf
DOC
Take back your security infrastructure
PPTX
Security Transformation
PDF
Cybersecurity After WannaCry: How to Resist Future Attacks
PPTX
Threat Intelligen.pptx
PDF
Mark Lanterman - The Risk Report October 2015
PDF
How to Knock Out Threats from Crypto-Style Viruses
PDF
Measures to Avoid Cyber-attacks
PDF
Measure To Avoid Cyber Attacks
PPTX
Internet safety and you
PDF
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
PDF
Threat Lifecycle Management_Whitepaper
PDF
threat-lifecycle-management-whitepaper
PPTX
A Comprehensive Guide on How to Recover from a Ransomware Attack
PDF
Security operations center 5 security controls
DOCX
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
How Can Cybersecurity Services Help Protect My Organization from Ransomware A...
In computer security, a vulnerability is a weakness which allows an .pdf
How to secure your enterprise data during Covid-19
Should You Pay Ransomware.pdf
Take back your security infrastructure
Security Transformation
Cybersecurity After WannaCry: How to Resist Future Attacks
Threat Intelligen.pptx
Mark Lanterman - The Risk Report October 2015
How to Knock Out Threats from Crypto-Style Viruses
Measures to Avoid Cyber-attacks
Measure To Avoid Cyber Attacks
Internet safety and you
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Threat Lifecycle Management_Whitepaper
threat-lifecycle-management-whitepaper
A Comprehensive Guide on How to Recover from a Ransomware Attack
Security operations center 5 security controls
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Ad

Recently uploaded (20)

PPTX
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
PPTX
basic introduction to research chapter 1.pptx
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
DOCX
Hand book of Entrepreneurship 4 Chapters.docx
PPTX
Astra-Investor- business Presentation (1).pptx
PPTX
CTG - Business Update 2Q2025 & 6M2025.pptx
PPTX
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
PDF
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PDF
Booking.com The Global AI Sentiment Report 2025
PDF
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
How to Get Business Funding for Small Business Fast
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
PDF
Blood Collected straight from the donor into a blood bag and mixed with an an...
BUSINESS CYCLE_INFLATION AND UNEMPLOYMENT.pptx
basic introduction to research chapter 1.pptx
Slide gioi thieu VietinBank Quy 2 - 2025
1911 Gold Corporate Presentation Aug 2025.pdf
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
Hand book of Entrepreneurship 4 Chapters.docx
Astra-Investor- business Presentation (1).pptx
CTG - Business Update 2Q2025 & 6M2025.pptx
Board-Reporting-Package-by-Umbrex-5-23-23.pptx
THE COMPLETE GUIDE TO BUILDING PASSIVE INCOME ONLINE
Daniels 2024 Inclusive, Sustainable Development
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
Booking.com The Global AI Sentiment Report 2025
Satish NS: Fostering Innovation and Sustainability: Haier India’s Customer-Ce...
Principles of Marketing, Industrial, Consumers,
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
How to Get Business Funding for Small Business Fast
Lecture 3344;;,,(,(((((((((((((((((((((((
PMB 401-Identification-of-Potential-Biotechnological-Products.pdf
Blood Collected straight from the donor into a blood bag and mixed with an an...
Ad

How to recover from your next data breach

  • 1. How to recover from your next data breach
  • 2. Put Together a Response Team A data breach demands a comprehensive response. Knowing who will be part of your response team and assigning their primary tasks ahead of time will help you quickly take appropriate action. The team should be enterprise-wide and include key members of the executive team and board of directors, the head of IT, security experts, as well as representatives from your legal, communications and HR departments. It is important to remember that it is not just your company’s data that has been compromised. Employees need to know what risk they are at and what they need to do. Vendors and clients who were impacted need to be informed. Having a comprehensive team in place will help create a multifaceted plan that addresses all the issues a data breach may create.
  • 3. Identify the Source and Spread In the aftermath of an incident, you do not want to take any steps that might spread the problem inadvertently. Keep focus on identifying the source of the attack and isolate the affected servers and systems. Infected machines should be analyzed to determine if a full operating system restore is required or if they can be cleaned using anti-ransomware software. As ransomwares like Ryuk evolve, creating a hierarchy of attack on a network, this isolation becomes even more crucial. This latest generation of attacks can be more effective, faster, and spread wider than those of the past. Ensuring your team is educated and updated on the latest variants will help them to know where to start looking once a breach occurs.
  • 5. If a ransomware attack happens and employees find themselves locked out of their data, the gut reaction may be to reload from backed-up files. That is what they are there for after all. There is a good chance, however, that these files have also been targeted by the attack, leaving them encrypted, unrecoverable or also infected. Always train employees to scan backup files before attempting a recovery. Digital storage systems that enable point-in-time recovery can be invaluable in reducing downtime from a ransomware attack that manages to encrypt data and backup files. These systems enable security and IT teams to roll back to a restore point before the infection, which should recover the bulk of the data in a single step. Since these systems track changes at the block level, they are able to recover quickly. Back-ups of the most critical files and data should be kept in air-gapped storage systems. This ensures that at least one copy of the data is always housed on servers that are isolated from the network and will remain unaffected by an attack.
  • 6. Don’t Cover It Up When it comes to data breaches of any kind, from a DDoS attack to malware, there can be a perceived negative stigma. There may be fears that the breach will make your company look careless and undermine the trust of clients and partners. There may be an impulse toward keeping quiet. After all, if no one knows about it, it didn’t really happen. The truth is these sorts of attacks are common. A breach is not a sign of corporate weakness, it is an unfortunate reality of existing in the digital age. The worst thing you could do after a breach is to keep it quiet. In many cases, your company has a legal duty to notify law enforcement or privacy regulators. Every attack needs to be understood so as to give White Hats a chance to bring equilibrium to that ebb and flow of vulnerability. Reporting is the first thing you can do to protect your organization from a subsequent attack.
  • 7. In the aftermath of a breach, your company’s leadership will be focused on cybersecurity. That presents an opportunity for a wide-ranging evaluation of your current security practices, procedures and tools. Don’t waste it. Protect Your Network from Another Attack
  • 8. SILO Compliance Systems 1067 South Hover Street, #E-172, Longmont, Colorado, 80501