A basic IT disaster recovery plan should identify steps to assess damage and restart operations. It should also identify who’s responsible for which tasks and specify how often to update the plan.
What happens to your IT systems and data in case of a disaster? Your business might have a disaster recovery plan, but does it cover those areas? In a cyber attack, you could lose your business’s network access and data. A basic IT disaster recovery plan should detail the steps to get you running:
1. What did they steal? Assess damage
What data is compromised? Is just names and addresses or more serious data such as passwords or credit card numbers?
2. Respond immediately
Change all your logins and passwords. Use completely different random passwords. If they accessed your banking information, call your bank and ask to cancel cards and issue new ones.
3. Advise customers, suppliers and anyone else affected
Advise customers and others as soon as you’re aware of a breach. Tell them what data was hacked, what you’re doing about it what they should do.
4. Perform an audit to determine the scope and vulnerabilities
Audit your systems to figure out what happened after a breach. If the cyber attack involves criminal activity and stolen financial information, hire a consultant to audit the scope of the damage. This helps to determine the scope of the attack and recommend actions to plug security gaps.
Bottom line: cyber attacks are the new normal for small businesses!
If you’re still reading, then you know vulnerable you are to cyber crime. Cyber attacks are the new normal for small business. Media reports focus on corporate mega breaches, but as mentioned earlier, small businesses are the new frontier for cyber criminals.
Large corporations have the resources to survive big breaches. On the other hand, a small business might have to close shop after a breach. Given the risks, you need to make sure you prepare to prevent. Have the right measures ready and regularly updated rapid response and IT disaster recovery plans. Use an IT services firm if it makes sense for your business and treat cyber security as importantly as any other aspect of your business.
Follow Microsoft 365