Your Incident Response Plan Should Be Your Best Laid Plan

Jul 10, 2020 | Cyber Security, IT News

No matter how strong your cybersecurity posture is, you’re never one hundred percent secure. When an attack does get through – whether the consequences are a data breach, a ransomware lockdown, or worse – you need to have a plan in place. That’s where an “incident response plan” comes into place. Any organization can be targeted by a cyberattack, so having a plan like this is necessary and incredibly useful, no matter what your organization is or its size.

What Is an Incident Response Plan?

At its simplest form, an incident response plan is a list of instructions to follow when a cybersecurity intrusion occurs. They say “the devil is in the details.” But honestly, having a detailed, well-outlined document can save your organization. An incident response plan is such a document. The form it takes doesn’t really matter (a paper document on your desk, a poster image on the wall of the office, a file on your network, etc), as long as the plan is there and understood by your team. It will help you respond to and recover from potential — and indeed inevitable — security incidents. Damage control and mitigation is the name of the game.

How Do You Make an Incident Response Plan?

Your Incident Response Plan Should Be Your Best Laid PlanEvery incident response plan should cover, in detail, what needs to happen under a certain situation or scenario. So, it goes without saying that a lot of thought and strategy goes into it. That’s the whole point. And while it can seem overwhelming at first, they’re generally broken up into three parts:

  1. Identification – What happened? What was the security incident? Where did it happen? Who is best suited to deal with that particular incident? The who, what, when, where, and why are the first things to address when trying to determine how to keep things from going from bad to worse. Detailed records of the incident should be kept regarding each of these questions.
  2. Containment – Now that you know what happened, it’s time for some damage control. Isolate any and all affected systems to prevent further damage. Find the original cause and remove anything that it touched. Also, be sure to disconnect from the network and stop backing up data immediately. (This will stop the malicious software from overwriting clean backups with infected files.)
  3. Recovery – The damage has been done, and hopefully it’s been fully contained and minimized as much as possible. Time to fully take stock of what’s been lost and begin the process of retrieving what you can. Previously affected systems can slowly come back online, but only after being certain there’s no longer a threat. A Backup, Disaster, Recovery (BDR) solution can help this process tremendously. If you have one, use it to restore from the most recent, clean backup.

No security system is foolproof. And no human is perfect. Mistakes can happen, and damage will be done. This is simply a fact of life. And while much can and absolutely should be prevented, how you respond to a cybersecurity disaster is just as important. Having a plan in place is just as essential as locking the door: You need to know what to do if someone does break in. Not only can V2 Systems help you come up with and deploy this plan, but we can also greatly reduce your chances of ever needing it in the first place.

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!

More From V2 Systems

The Audit Readiness Problem Government Contractors Can’t Afford to Ignore

Many government contractors are not failing audits because they lack tools. They are failing because documentation is incomplete, evidence is disorganized, and readiness starts too late. This blog explains the most common gaps and how to fix them before an audit begins.

You Can’t Secure What You Can’t See: Why Asset Visibility Is a Cybersecurity Requirement

Asset visibility is one of the most overlooked parts of cybersecurity. In this blog, we explain why businesses need clear visibility into hardware, software, users, and cloud assets to reduce risk, strengthen operations, and support compliance.

When One Suspicious Alert Prevented a Much Bigger Disaster

A former client narrowly avoided a much larger cybersecurity incident after suspicious Microsoft 365 activity revealed an unauthorized intrusion. In this blog, we break down what happened, how phishing may have played a role, why MFA still matters, and what businesses should do next to reduce risk and respond quickly.

CMMC in Practice: How Day-to-Day IT Operations Affect Compliance

CMMC is not just policy. It depends on day-to-day IT execution like patching, access control, monitoring, and documentation. This blog explains what contractors should focus on now, plus why the assessment process can be more expensive than expected.

What Happens After the Breach: How Incident Response Really Works for SMBs

Incident response is what determines whether a cyber incident becomes a short disruption or a major business crisis. This blog explains the real steps SMBs should take after a breach and how MSP support speeds recovery.

Free
Small Business Cybersecurity Checklist

cybersecurity checklist graphic