How Can You Avoid Cyber Threats with Incident Response Plan?


Posted February 24, 2018 by zaidinbutt

Some companies invest in commercial tools but the problem is that these tools are not meant to detect incidents but more suited for IT help desks.
 
Even in these days with systems, innovations, and processes available to automate incident responses to assist companies with cybersecurity, most still prefer to do it manually. Organizations still rely on spreadsheet and emails that get handed to someone who has a reputation for finding system breaches or faults and malicious traffic.

Some companies invest in commercial tools but the problem is that these tools are not meant to detect incidents but more suited for IT help desks. Ideally, the security team needs to find and track an incident continuously but cannot do so with conventional IT tools.

There are a lot of companies that try to hash together a detection system of their own in a bid to move away from manual processes. However, this mashed together system of scripts, databases and applications fall far short of their intended purposes. Often the open-source tools available fail in their function, ease of use and scale leaving glaring holes in the detection and tracking of cyber security.

A movement from reactive to proactive.

Earlier versions of incident response have been solely reactive. When a severe incident was detected, remedies such as capturing files and memory processes, deploying forensic tools that looked for suspicious files and capturing network packets were used. These efforts focused on containing the problem and then fixing it. Now, companies are moving toward being more proactive. They are intent on stopping any threats from infiltrating in the first instance. Continuous monitoring and automated responses to network security are what more companies are using these days.

It is important to have a plan

The effective incident response starts with a plan. An incident response plan should include the following:

Address business continuity issues and assign appropriate roles.

Involve all relevant business department and get their inputs and collate everyone’s needs.

Establish key performance indicators to measure the severity of the incident and the responses.

Create a continuous testing schedule and put in place a rigorous testing plan and schedule.

All plans have to be routinely re-evaluated and updated to combat ever-changing threats.

Determine and constantly update a list of what the organization perceived as a threat.

Appoint an experienced incident response person in charge of the team.

Invest in and implement the proper tools. Source externally if you can.

Establish and implement a communications strategy and protocols for internal and external audiences.

It has become vital for companies – private and federal alike, to implement a stringent incident response. Cyber threats are increasing year to year and the types of breaches are increasing constantly. Just recently, there has been a rapid rise in ransomware attacks on organizations. When organizations are not able to detect a ransomware threat, it will mean a loss of profits and productivity.

All organizations have to be prepared for data breaches and hacks. Developing an incident response playbook is vital to ensure business continuity. Also, it is important to ensure the safety and security of your customers and staff personal details and information.
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By zaidinbutt
Website incident response playbook
Country United Kingdom
Categories Security
Tags cybersecurity , databases and applications , network security
Last Updated February 24, 2018