{"id":7979,"date":"2022-09-20T09:46:12","date_gmt":"2022-09-20T14:46:12","guid":{"rendered":"https:\/\/greatermankatoblog.com\/?p=7979"},"modified":"2024-01-04T14:46:38","modified_gmt":"2024-01-04T20:46:38","slug":"approaches-to-handling-cyber-incidents","status":"publish","type":"post","link":"https:\/\/greatermankato.com\/blog\/approaches-to-handling-cyber-incidents\/","title":{"rendered":"Approaches to Handling Cyber Incidents"},"content":{"rendered":"\r\n\r\n\r\n
Blog written by Corporate Technologies LLC, a Greater Mankato Growth member<\/em><\/p>\r\n\r\n\r\n\r\n Balancing a Proactive and Reactive Approach to Cyber Incidents<\/strong><\/p>\r\n\r\n\r\n\r\n A cyber incident is a type of security event that can harm a business like yours. Ranging from data breaches and system failures to malware attacks and phishing scams, these incidents can hinder productivity, revenue growth, and customer satisfaction.<\/p>\r\n\r\n\r\n\r\n In most cases, a cyber incident will result in data loss or downtime. This can include loss of <\/p>\r\n\r\n\r\n\r\n We can all agree that no one wants their business to be hacked. A single cyberattack can rob you of your time, money, and peace of mind. In addition to getting systems operational and data restored, you must let all affected parties know that their data may have been compromised. This can be a difficult situation to navigate for anyone, but it doesn\u2019t have to be the end of the world. In this blog, we\u2019ll provide you with proactive and reactive approaches to tackle an attack, cope with the aftermath of a hack and prevent future incidents.<\/p>\r\n\r\n\r\n\r\n Proactive Steps to Implement<\/strong><\/p>\r\n\r\n\r\n\r\n By taking these proactive steps, you can help protect your business from the devastating Routinely update your passwords<\/strong><\/p>\r\n\r\n\r\n\r\n It\u2019s critical to update your passwords regularly to help keep your accounts safe. By updating your passwords every six months, you can help protect your accounts from being hacked:<\/p>\r\n\r\n\r\n\r\n Here are a few tips on how to create a strong password:<\/p>\r\n\r\n\r\n\r\n Real Cyber Incidents Experienced by Small Businesses<\/strong><\/p>\r\n\r\n\r\n\r\n Although the media usually underreports attacks on small businesses and focuses on data 1. When the bookkeeper of a boutique hotel began receiving insufficient fund notifications for regularly recurring bills, the chief executive officer (CEO) realized their company had been the victim of wire fraud.<\/p>\r\n\r\n\r\n\r\n A thorough examination of the accounting records revealed a severe issue. A few weeks prior, the CEO had clicked on a link in an email that they mistook for one from the Internal Revenue Service (IRS). It wasn\u2019t the case. Cybercriminals obtained the CEO\u2019s login information, giving them access to sensitive business and personal information.<\/p>\r\n\r\n\r\n\r\n This attack had a significant impact. The company lost $1 million to a Chinese account and the money was never recovered.<\/p>\r\n\r\n\r\n\r\n 2. The CEO of a government contracting firm realized that access to their business data, The breach had a significant operational and financial impact, costing more than $1 million. The company\u2019s operations were disrupted for several days since new security software licenses and a new server had to be installed.<\/p>\r\n\r\n\r\n\r\n Collaborate for Success<\/strong><\/p>\r\n\r\n\r\n\r\n Your business is not immune to cyberthreats. To address incidents as they occur, adequate <\/p>\r\n\r\n\r\n\r\n <\/p>\r\n","protected":false},"excerpt":{"rendered":" Blog written by Corporate Technologies LLC, a Greater Mankato Growth member Balancing a Proactive and Reactive Approach to Cyber Incidents A cyber incident is a type of security event that can harm a business like yours. Ranging from data breaches and system failures to malware…<\/p>\n","protected":false},"author":24,"featured_media":7982,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[855],"tags":[],"post_author":[],"acf":[],"yoast_head":"\n
confidential information, customer data, or business records. In some cases, a cyber incident can also cause business interruption or financial loss.<\/p>\r\n\r\n\r\n\r\n
consequences of a cyberattack:<\/p>\r\n\r\n\r\n\r\n\r\n
breaches that affect large corporations, here are two instances of incidents that severely impacted small businesses:<\/p>\r\n\r\n\r\n\r\n
including their military client database, was being sold in a dark web auction. The CEO soon noticed that the data was outdated and had no connection to their government agency clients. How did this data leak happen? The company discovered that a senior employee had downloaded a malicious email attachment thinking it was from a trusted source.<\/p>\r\n\r\n\r\n\r\n
security measures and an incident response plan are required. Consider consulting with an IT service provider like us if you need help identifying the right technologies to prevent a cyber incident or help with developing an incident response plan.<\/p>\r\n\r\n\r\n\r\n