• Skip to main content
  • Skip to footer

610-978-5160

  • Facebook
  • Instagram
  • LinkedIn
  • Twitter
Nettology logo

Nettology

IT Experts in Philadelphia. AWS Cisco Vmware Consulting

Contact Us
Menu
  • Services
    • IT Services
    • AWS Migration
    • Cybersecurity Protection
    • Office 365 Migration
    • Network Support
    • On-Site Service
      • Delaware
      • Philadelphia
      • New Jersey
  • Support Packages
  • Testimonials
  • About Us
    • Blog
    • Our Owners

5 crucial steps to take in the event of a data breach

Home » 5 crucial steps to take in the event of a data breach

October 10, 2017 by Preston Terrell

Do you know what to do if your business experiences a data breach? Is there a plan in place if your company falls victim to ransomware? Although no one wants to think about a data breach scenario, it’s best to have a cyber breach response plan if your network has been hacked and your company’s critical data is now being held for ransom.

 

5 critical steps to take when faced with a data breach

 

Step 1: Lock down the network and stop the security breach. Apply an access list for both incoming and outgoing traffic. Although this poses an inconvenience for many, it is necessary to restrict traffic throughout your network, and it is necessary to either restrict, or possibly disconnect internet access while filters and access lists are applied.

 

Step 2: Change ALL user names and passwords. Once your network has been compromised you do not know which user names and passwords were also compromised. Require users to change their passwords with a lockout policy of three incorrect attempts. This is also a great time to implement Multi-Factor Authentication if you haven’t already.

 

Step 3: Logs are the key to identify the extent of the breach. Did a teenager just turn your production database server into a Minecraft gaming server, or did a hacker just copy all of your financial information?  Copy all logs from key servers and firewalls to a centralized storage device.

 

Step 4: Analyze. Use security tools to comb through the logs and evaluate what was accessed. This is far too complicated of a step to be done by hand; it requires the automation of specialized security software. Nettology has the tools that can execute these scans to pinpoint what has been accessed.

 

Step 5: Gather the results and discuss them. Collaboration and communication between IT staff, management, and possibly even the legal team is essential. Hackers are very good at what they do; there is no time for finger pointing or trying to decide who is at fault. Work together, communication is the key.

 

Why wait for a data breach to occur?

Why wait to have your company and your customer data stolen?  Nettology can conduct external and internal network vulnerability assessments that will spot weaknesses that hackers can exploit to gain entry into your data network.

We also offer cost-effective backup and disaster recovery solutions that provide state-of-the-art cyber security protection for your company.

Contact us for more information.

Security data breach

Subscribe to our newsletter

Get the latest posts delivered right to your inbox

Schedule your free consultation today!

Talk to one of our IT consultants about your goals. We'll talk with you about how we can create a custom service plan for your business.

Contact us

Footer

Our Company

Nettology LLC
50 W Powhattan Ave
Essington, PA 19029
610-978-5160
Contact Us

Hours of Operation

Mon: Open 24 hours
Tue: Open 24 hours
Wed: Open 24 hours
Thu: Open 24 hours
Fri: Open 24 hours
Sat: Open 24 hours
Sun: Open 24 hours

Services

  • AWS Consulting
  • AWS Migration
  • Ransomware Protection
  • Office 365 Migration
  • IT Support Services
  • Network Support

Latest Articles

  • Top 10 Questions About Managed IT Services
  • What are Managed IT Services?
  • Tips for Empowering Your Remote Team
  • Why Do I Need an MSP?
  • Cloud Server Hosting Explained: How Does it Work?
  • Facebook
  • Instagram
  • LinkedIn
  • Pinterest
  • Twitter

Copyright © 2023 Nettology LLC. All rights reserved.
Privacy Policy | HTML Sitemap