- targeted capture and ransoming of company or customer data
- unauthorized modification of a system either via an individual or via malicious software
- elevation of system privileges without authorization
- unauthorized use of a system's resources (storage, cpu, memory, processes, etc.)
- denial of service to a network
- programmatic manipulation of a system or network to attack a third-party
Of note, Deloitte found that 39% of organizations in 2022 experienced a significant cybersecurity incident.
It is important to note that the frequency of cyberattacks can vary depending on the source and the type of attack. Cybersecurity is a constantly evolving field, and new threats are emerging all the time. Therefore, it is essential to stay informed about the latest trends and best practices for protecting your digital assets.
- Employees use financial institution computers to obtain customer information and commit fraud using the customer information.
- An individual was charged with trafficking in passwords and similar information that would have permitted others to gain unauthorized access to his employer's computer network.
- Former employee of arrested on charges of hacking into company's computer and destroying data.
An excellent start is the development of a Computer Incident Response plan. The plan should supplement your Business Continuity Plan (BCP). It should include a general response plan with a designated incident leader. Team members with all of their contact information should be available to the leader. The company's BCP will be relied upon for other issues such as media response, facilities management, disaster recovery, etc. If your company does not have an Incident Response plan, Information Risk Group has experienced professionals who can aid your company with its development.
Another preventative measure your company should consider is a security assessment. An annual security assessment should be performed against your company's administrative, technical, and physical safeguards. The assessment will enable your company to concentrate its limited budget on its information security weaknesses.
It is important that you do not panic when your systems are under attack. Active incidents are among the most technically stressful and challenging events your IT employees will ever face. They require experience and advanced knowledge to solve and prosecute. Minimally consider performing the following actions:
- Do not turn the system off, if you have to stop the attack because you are losing proprietary information then remove the cable from the machine.
- Document what is occurring on a separate system or on paper. Document the system and the individuals performing any valid interaction with the system.
- Observe the intruder by monitoring and recording events occurring on the network.
- Recall backup tapes in preparation to restore the system.
- Follow your incident response plan and if necessary ask for outside help.
Please contact us with any questions you may have on this subject or any other services Information Risk Group offers.
Information Risk Group offers information security and risk management services to companies throughout the Americas.