Plan A stops hackers in their tracks. But what is your Plan B?
Cybercriminals manage to breach computer defenses on a daily basis. Keeping your cybersecurity protections up to date is vital; however, nothing is perfect.
Computer Breach Emergency Checklist
In case you experience a breach, be prepared to act quickly with this Computer Breach Emergency Checklist.
- Immediately disconnect your network from the internet and, while someone does that, call your cybersecurity insurer if you have one. Do this immediately! Check with the insurer to make sure that they approve a cybersecurity incident response company and an expert cybersecurity attorney.
- Disconnect any infected computers from your local network. If not sure, disconnect all your computers. You can do that by disconnecting cables at your network switch and powering off any WiFi hotspots.
- Call a (insurer-approved) cybersecurity company for immediate advice about what to do and what not to do. For example, your IT support person might want to reformat and reinstall infected computers. You may risk destroying evidence of what sensitive information may have been stolen and who stole it. Don’t proceed without the go-ahead from a cybersecurity specialist. Three expert companies are suggested, below.
- You have various legal responsibilities in the event of a potential breach of client information. Consult an expert cybersecurity attorney, not a general practitioner unless for a reference.
- Reset every single password used by anyone in your firm. Since your computers are disconnected from the internet, you could use mobile phones to do so. Another option is to use a mobile phone as a hotspot that any uninfected laptops could connect to in order to make the changes.
- Enable multi-factor authentication (MFA) for all internet accounts and remote control accounts such as LogMeIn, GoToMyPC, or my favorite, Splashtop, if you have not already done so.
- Close any backdoors. It may not be enough to remove all the malware that is installed on your computers. Hackers may have left secret backdoors into your network. Your cybersecurity experts can track those down and eliminate them.
- Follow the advice of your cybersecurity attorney. The attorney-client privilege can protect your consultation. The advice may include:
- Preserving evidence of the break-in on original or cloned hard drives.
- Notifying law enforcement authorities of the breach.
- Contacting clients and others to warn of potential adverse effects and precautions relating to the break-in.
- Educating your people about safe practices and warning signs.
- Implementing better cybersecurity practices and defenses.
- Managing the public relations and reputational aspects of the incident.
- Take a deep breath! You will get through this with experienced providers.
For expert assistance with cybersecurity breaches and incidents, you could contact:
LMG Security (lmgsecurity.com), 145 W Front Street, Missoula, Montana 59802, Tel: 406/830-3165
Sensei Enterprises, Inc.(senseient.com), 3975 University Dr., Suite 225, Fairfax, VA 22030, Tel: 703/359-0700
Horne Cyber (hornecyber.com), 16945 Northchase Dr., Suite 2000, Houston, TX 77060, Tel: 346/200-5968
Note: Make sure you have a paper copy of the checklist or link to this post on your phone. The checklist won't do you any good if it is only on a server that's down!
Wells H. Anderson, JD, CEO, SecureMyFirm. Originally published in GPSolo eReport; Solo, Small Firm and General Practice Division; American Bar Association.