Post-Breach: How to Recover from a Cyber-Attack

Ian Marlow HeadshotBy Ian M. Marlow
March 5, 2016

When it comes to cyber-attacks these days, it’s really not a matter of if, but of when. Hackers seem to be able to break through even the strongest of security measures, and businesses have to be ready to combat an attack when it happens. Unfortunately, it’s not just the big businesses that are at risk, but any business with an internet connection. And it can make your professional life miserable until it’s under control. Here are some things you can do to recover after a cyber-attack.

  1. Figure out how bad the damage is. Once you discover that a cyber-attack has happened, you need to immediately take steps to determine how bad it is. This will help you figure out exactly what you need to do, and who you need to call on, to get the problem under control.
  2. Figure out how it happened. The next step is to figure out exactly what went wrong. Was there a weak link somewhere? Did an employee fall victim to a scam? Was there a phishing email or phone call? Did something happen with your network? If your computers are crashing often or you are getting visits from odd IP addresses or emails, these can all be signs. You need to know where the damage came from before you can fix it.
  3. Stop the bleeding. Now it’s time to fix what went wrong. Remove any infected workstations from the network. Get the help you need from you internet service provider and your IT specialists. You won’t be able to work as efficiently as normal for a while, but you need to do this to get your company back on track.
  4. Remove the weak link. This probably won’t be quick or easy, but it has to be done. Reinstall programs, obtain more sophisticated firewalls, change passwords (and make them strong ones), and teach your employees what to do to hopefully avoid a future attack.
  5. Handle your customers with kid gloves. You have to handle your customers like the prized possessions that they are. They, as well as your company, are victims. Be honest about what happened, let them know if their information is at risk, and assure them that you are doing everything within your power to rectify the problem as quickly and thoroughly as possible, while taking pains to be reasonably sure it doesn’t happen again. And then make sure you stay true to your word, and do everything that you’ve promised your customers you will do.

Cyber-attacks are horrible, there’s no doubt about it. There’s nothing quick, easy, or pleasant about this. But it does not have to mean the death of your company. You can get back up to speed if you follow this advice.

If you need a consultation on your computer software needs, contact FITECH today at (212) 223-TECH (8324), email info@fitechllc.com or visit www.fitechllc.com. You can also find us on these social media outlets: Facebook, Twitter, LinkedIn, YouTube, and Google+.

This entry was posted in Process, Technology and tagged , , on by .

About Ian M. Marlow

Ian Marlow is Chief Executive Officer of FITECH Consultants, a national technology consulting firm which he founded in 2001. A visionary about where a business’s processes, intellectual capital and technology intersect, Marlow guides companies to help them better understand how these three areas must work together to realize meaningful business objectives.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s