6 Ways to be Better Prepared for an Incident

by Chris Bedel | Feb 22, 2019

6Ways_To_Be_Better_Prepared

Unfortunately, cyber criminals are getting better and better at what they do. Threats are constantly changing and evolving and it's our responsibility to stay one step ahead at all times. But sometimes institutions can get too complacent thinking their security measures are enough and that an incident won't happen to them. Until it does. Then they're left scrambling to pick up the pieces. 

That's why we think that staying one step ahead should include taking the time to be properly prepared for when an incident might happen. That way it won’t cripple your team during such a crucial time.

So this week we look at 6 of the biggest problems we see banks and credit unions run into after an incident and what you can do ahead of time to avoid them.

  • The security staff not trained to handle an incident

What you can do:  Train your security staff on standard incident response techniques and, more importantly, on the specific procedures set by your organization.  Take the time to conduct table top exercises to let your team prepare for various scenarios and look for ways to improve their response. 

  • Organizational Shellshock

What you can do:  Promote user awareness that breaches do happen and are a very real thing.  Focus on what to do next at various levels of various departments.  Don’t make the mistake of only communicating this to IT staff.

  • Incident Response Team Poorly Represented

What you can do:  Be sure to include other departments along with IT and Security, like Executive Management, Legal, Human Resources, Public Relations, etc.

  • Lack of Network Visibility

What you can do:  Create an accurate representation of your digital enterprise.  This includes accurate, up to date, network diagrams, data flow diagrams, IP address lists, asset inventory, etc.

  • Lack of Skills to Perform Network/Packet Forensics

What you can do:  Keep the experts on speed dial.  Some digital forensics experts require an on-boarding fee along with ongoing retainer ahead of time to “be available” in the event of a cyber incident.  Communicate with those experts that you will need for an incident ahead of time; don’t wait until a crisis to have that conversation.

  • “Ideal” Packets not Stored in Advance

What you can do:  Forensics teams are relying on network packets now more than ever to piece together the puzzle of a breach or major incident.  Without baseline network packets stored before the alert, it becomes difficult to differentiate the good from the bad.  This doesn’t mean keeping EVERYTHING, but only packets around detected events.  Setting a strategy for this would probably mean a conversation with your Log/IDS team or SIEM provider.

 

The biggest takeaway from these 6 items is that you don’t wait for the incident to address them. A little work ahead of time can put you miles ahead in the long run. 

If you're looking for extra help with your Incident Response, check out our CySPOT™ Incident Response Planning and Preparation Module.

If you found this article helpful and want to have our articles delivered directly to your inbox every week sign up for our newsletter.

 

The Bedel Security Newsletter

Want these articles delivered weekly to your inbox? Subscribe to our Newsletter!

Recent Posts

Stay in the Loop!