{"id":2689,"date":"2017-03-24T14:32:35","date_gmt":"2017-03-24T18:32:35","guid":{"rendered":"https:\/\/www.lindabury.com\/firm\/?p=2689"},"modified":"2017-04-24T11:20:07","modified_gmt":"2017-04-24T15:20:07","slug":"responding-cybersecurity-breach-establish-response-team","status":"publish","type":"post","link":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html","title":{"rendered":"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team  \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0"},"content":{"rendered":"<p>It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked. \u00a0A million thoughts rush through your head, but they all come back to one question: what do I do right now to protect my company, my employees and my customers? The answer may seem daunting, but an answer does exist. This article attempts to provide you with a few of the basics on how to respond to a cyber-attack, focusing on the first step: Establishing your cyber-response team.<\/p>\n<p>The first step to be taken upon learning of a cyber-breach is to understand what happened and what type of breach occurred.\u00a0 For example, is your system being held hostage by Ransomware, or did an employee mistakenly release confidential information? There are a number of common circumstances for cyber-breaches, such as: employee negligence like losing a laptop or flash drive containing personally identifiable information (\u201cPII\u201d) or protected health information (\u201cPHI\u201d); malicious insider behavior, such as the disgruntled or dishonest employee who steals company information to use for some nefarious purpose against the company; and perhaps the most wildly publicized breach as of late, hacking and cybercriminal activity.<\/p>\n<p>In order to understand what happened and how best to react, the initial step is to assemble a team of <a href=\"https:\/\/www.lindabury.com\/cybersecurity-data-privacy.html\">cybersecurity<\/a>\u00a0 professionals who can assist with all facets of the cyber-breach. \u00a0In a perfect world, your company has already established its own cyber-breach response team, but if you have not done so, you will need to hire professionals as soon as possible after learning of the cyber-attack.\u00a0 This means engaging individuals who possess expertise in Information Technology and are experienced in evaluating the severity and scope of a cyber-breach. The cyber-breach needs to be quickly identified, affected systems need to be isolated, defenses to future breaches need to be put in place and steps to retrieve data need to be taken.<\/p>\n<div class=\"read_more_link\"><a href=\"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html\"  title=\"Continue Reading Responding to a Cybersecurity Breach \u2013 Establish Your Response Team  \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\" class=\"more-link\">Continue Reading \u203a<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked. \u00a0A million thoughts rush through your head, but they all come back to one question: what do I do right now to protect my company, my employees and my [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[307,88,65],"tags":[],"coauthors":[178],"class_list":["post-2689","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-data-privacy-insights","category-levine","category-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events<\/title>\n<meta name=\"description\" content=\"It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"og:description\" content=\"It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html\" \/>\n<meta property=\"og:site_name\" content=\"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-24T18:32:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-24T15:20:07+00:00\" \/>\n<meta name=\"author\" content=\"Eric B. Levine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric B. Levine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html","og_locale":"en_US","og_type":"article","og_title":"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","og_description":"It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked.","og_url":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html","og_site_name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","article_published_time":"2017-03-24T18:32:35+00:00","article_modified_time":"2017-04-24T15:20:07+00:00","author":"Eric B. Levine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eric B. Levine","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html","url":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html","name":"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212; March 24, 2017 &#8212; Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","isPartOf":{"@id":"https:\/\/www.lindabury.com\/firm\/#website"},"datePublished":"2017-03-24T18:32:35+00:00","dateModified":"2017-04-24T15:20:07+00:00","author":{"@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f"},"description":"It is a day that virtually every business owner fears, when you receive word from your IT department that your company\u2019s computer system has been hacked.","breadcrumb":{"@id":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lindabury.com\/firm\/insights\/responding-cybersecurity-breach-establish-response-team.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.lindabury.com\/firm\/insights"},{"@type":"ListItem","position":3,"name":"Responding to a Cybersecurity Breach \u2013 Establish Your Response Team \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.lindabury.com\/firm\/#website","url":"https:\/\/www.lindabury.com\/firm\/","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C. Firm News &amp; Events","description":"Published by Lindabury, McCormick, Estabrook &amp; Cooper","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lindabury.com\/firm\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/429b3bd6b52a7aa6eb9a0709bbb4d06f","name":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lindabury.com\/firm\/#\/schema\/person\/image\/3f2ca7450f0195db092bccff4fb8982e","url":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a19d0fac94b8d3d657028926f65c841917c5f8f0dd3f23ad394e83f16c690e09?s=96&d=mm&r=g","caption":"Lindabury, McCormick, Estabrook &amp; Cooper, P.C."},"sameAs":["https:\/\/www.lindabury.com"]}]}},"yoast":{"focuskw":"","title":"","metadesc":"","linkdex":"","metakeywords":"","meta-robots-noindex":"","meta-robots-nofollow":"","meta-robots-adv":"","canonical":"","redirect":"","opengraph-title":"","opengraph-description":"","opengraph-image":"","twitter-title":"","twitter-description":"","twitter-image":""},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/comments?post=2689"}],"version-history":[{"count":4,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2689\/revisions"}],"predecessor-version":[{"id":2722,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/posts\/2689\/revisions\/2722"}],"wp:attachment":[{"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/media?parent=2689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/categories?post=2689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/tags?post=2689"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lindabury.com\/firm\/wp-json\/wp\/v2\/coauthors?post=2689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}