NovaBACKUP Security Blog

Preparing for Data Breach

Data-Breach

We all hope that it's not a self-fulfilling prophecy. We must hope for the best, prepare for the worst, and not be surprised by anything in between (Maya Angelo). Solid preparation helps us to avoid a worst-case scenario with the devastating effects of a data breach. The immediate actions you take upon discovery of a data breach incident can facilitate a quick recovery, blunt financial and repetitional damage, and enable a fast return to business.

Types of Data Breach

From stolen passwords, phishing attacks, unpatched hardware, or malware, data breaches can occur in any number of ways. How you respond, in part, may depend on the type of business you are conducting. Customers, in government or highly regulated industries may need to follow a very specific flow of communication and notification to meet compliance standards, while Managed Service Providers may have to notify thousands of clients about actions to take and the status of service. But in all cases of a data breach, you will need to identify the problem, communicate internally (and externally), mitigate the damage, enact business continuity measures, recover data, and analyze how this event took place.

Listen to a Podcast episode about MSP considerations when responding to data breaches.

MSP Response to Data Breach

When a breach is first identified, an MSP must have a clear set of standard operating procedures. Leadership will be required to carry out important security actions.

  • Define your business's emergency response team
  • Designate appropriate roles and responsibilities
  • Construct a hierarchy and contingency plan should a member be unavailable

Communications

Not only who will be notified and when, but also via what methods. Automation is great for fast effective internal notifications, but cannot always be relied upon. This makes documenting manual procedures an important backup course of action. Once your response group communications have been established, is your plan clear enough that anyone could understand it? As you take on new IT team members it may be worth seeing if they can explain what needs to happen from a company-wide standpoint based on your documentation.

What is your responsibility to your customer in a data breach scenario? Yes, you'll want to secure their data and communicate clearly, but these are very broad concepts. Every new customer relationship should include signed agreements or contracts that set the appropriate expectations and define the minutia of the MSP's responsibility to the client.

Finally, businesses may find their password software or other security tools become unavailable at the worst possible moment. Document your security procedures manually as a backup to any applications that control access during an emergency.

Conduct a Practice Run

Are you aware of the most common methods of attack? Look at your situation from a potential attacker's perspective and build out the most likely scenarios. A vast amount of knowledge can be gained by running through simple tabletop exercises that illuminate any foreseeable obstacles and address team concerns well in advance of a real problem.

TIP: Develop the 10 most likely data breach scenarios and run through 1 every quarter with team members in a simulated activity.

Scenarios should include the most common attacks, such as:

  • Ransomware Attack
  • Compromised Credentials
  • Insider Leak
  • Distributed Denial of Service (DDOS)

Should clients be involved in your breach response simulation? That's up to you. Will they see value in a partner who is taking every precaution to ensure the security of their data? Then by all means, show them the value you are providing and educate them on the actions they must take in a disaster scenario.

Response Plan

Your data response plan should define how your business halts the progress of a threat and maintains business continuity to critical systems. How will customers be notified? These types of notifications can be built out in advance to save critical time. Other communications might include authorities or cyber insurance contacts. As an example, regulations like GDPR require that a data breach be reported within 72 hours. 

It is also often important to consider how this crime will be investigated, and recorded, and forensics eventually performed for legal reasons. At a minimum, your team should understand what actions to avoid that could interfere with an outside investigation.

Response planning should include the following steps:

  • Categorize data and prioritize risk to critical data in the event of total loss, theft, or sabotage
  • Risk assessment extends to applications, devices, and users
  • Business continuity plan in the event critical services become unavailable
  • Security policies and procedures that will contain threats (short-term / long-term)
  • Eradication and remediation of threat (enhancing protection / removing vulnerabilities)
  • How self-evaluation of security response will be conducted

Cyber Insurance

How liable are you during a data breach? There may be a range of requirements from your cyber insurance company that help to protect you during a data breach. Nobody wants to make a misstep that invalidates a potentially business-saving policy. Furthermore, these contracts should be reviewed annually to verify that no major changes have taken place that would require a policy update.
 
If at this point you are asking "Why do I need cyber insurance?", then we could discuss the obvious financial benefit in a ransomware extortion-type scenario. But more compelling is understanding how cyber insurance can work as a tool to close additional business and present your value to prospective clients. While all MSPs can promise the world to clients, fewer can produce proof of financial protection, and fewer still
train with customers for a detailed response to data breaches.

New Regulations

MSPs especially must pay close attention to the latest industry regulations regarding protected personal information (PPI) as they could become targets for greater regulation or be found liable for damages. A recently passed Louisiana security law, for example, requires MSPs to register with the state and notify of any ransomware payments made.

It's important not to fall behind and stay diligent about internal procedures. When new hardware is deployed your breach response plan must also be updated to reflect it. These documents must not sit static but continue to evolve.

The NovaBACKUP Cloud team works with MSPs to build a clear course of action to restore critical data. Our backup-as-a-service solution has received the HIPAA Certification Verification from the Compliancy Group to ensure compliance with strict privacy regulations. We invite you to speak with one of our backup experts about testing NovaBACKUP Managed Backup in your environment today.