Detect, Respond, Recover – Business
Detect
- Keep an eye on your computers for unauthorized staff access, gadgets (such as USB drives), and applications.
- Examine your network for any unauthorized access or connections.
- Look into any odd activity on your network or by your employees.
Respond
Have a plan for:
- Notifying consumers, workers, and anyone whose information may be compromised.
- Keeping company processes operational.
- Notifying police enforcement and other authorities about the attack.
- Investigating and containing a cyberattack.
- Using lessons learned, update your cybersecurity policy and plan.
- Preparing for unintentional occurrences (such as weather emergencies) that may jeopardize data.
Recover
After an attack:
- Repair and restore the impacted equipment and network components.
- Inform staff and consumers about your response and recovery efforts.