To Survive a Data Breach, Create a Response Playbook

To Survive a Data Breach, Create a Response Playbook

Breach Notification , Fraud Management & Cybercrime , Incident & Breach Response

Experts Detail Essential Systems and Procedures Every Organization Needs Now Mathew J. Schwartz (euroinfosec) • December 2, 2019     Ensure early warning systems are in place to detect breaches and other security incident. (Photo: Tomasz Pro, via Flickr/CC)

To best survive a data breach, have a response plan. Also ensure early warning systems are in place to detect hack attacks. Identify everyone inside and outside an organization who must be involved in responding to a suspected breach - and how, and when. And regularly practice and refine that plan so everyone knows what to do - and when - to help the organization rapidly shut down an intrusion and get back up and running.


Those are just some of the essential steps that information security experts say are mandatory for helping organizations to better defend against attacks, as well as detect and mitigate data breaches (see Why a Data Breach Response Plan Is Essential).


Here are seven essential components of a data breach preparedness plan.


1. Invest in Intrusion Detection and Monitoring


Many organizations hedge their data breach notifications by saying something akin to: "We have received no reports that potentially stolen data may have been fraudulently used." Such a lack of specificity, experts say, often traces to a breached business having failed to gather sufficient log data or retain it for a suff ..

Support the originator by clicking the read the rest link below.