What to do if the company is hacked? Actions from a legal perspective. | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker


In case of a hacking attack, unauthorised attackers attempt to access external PCs, notebooks, smartphones, tablets or even entire corporate networks.


A hacking attack is usually done using malicious software. These are usually small, inconspicuous programs, which are also known as trojans, viruses or worms. This allows attackers to access the external IT system, either damaging it, spying on it, or completely depriving its owners of it by deleting it or encrypting it.


The attackers usually operate worldwide and are therefore active both domestically and abroad. The motives of the hackers vary and range from the mere fun of being able to do it, to protest campaigns (usually former employees), or even to espionage and extortion.


Countermeasures


Most often, however, an attack is aimed at achieving financial gain which must be paid by the attacked company. As the frequency of such attacks has grown massively in Europe over the past year, let’s consider the successful external hacker attack that encrypts the affected systems in a way that the company cannot access its system at all.


In our legal practice, we see several challenges facing an affected company before normal operations return:


Identification of the hacker attack


A successful hacking attack usually first appears in the company’s IT department, which experiences unusually frequent outages of important IT systems. The analysis often shows that the affected areas cannot be accessed at all. This is because the company data was deleted by the attackers or encrypted in such a way that the affected company no longer has access to its own data.


Setting up a crisis team


Once the successful hack has been determined, a committee must be established to manage the hack and it ..

Support the originator by clicking the read the rest link below.