Protect your network, protect your business

The U.S. National Cyber Security Alliance found that 60 percent of small companies are unable to sustain their businesses over six months after a cyber attack.

ASSESS

Our team will analyze impact and severity to identify full extent of breach and develop action plan.

MITIGATE

Our engineers will deploy fixes, perform restorations and other remediation to roll back the damage.

VERIFY

Do further analysis and smoke testing to confirm that security threats have been mitigated.

BASELINE

Reestablish baseline based to better align security solutions and prevent future breaches.

What should we do if we experience a data breach?

If you just learned that your business experienced a data breach, you’re probably going to be stunned and wonder what to do. How did this happen? What steps should you take? Who should you contact? Is your business in jeopardy? These are all important questions to find the answers for, and we can help.

The first thing you should do is contact us for remediation services because it’s important to trace the data breach, identify the issue, and mitigate further impact on your business. It’s also important to move quickly to secure your systems and check for any vulnerabilities that may have caused the breach.

Once the extent of damage has been determined, our security team will use IT remediation best practices to correct the damage and update your security procedures to keep this from happening again. The only thing worse than a data breach is another one.

 

Remediation Experts are Ready to Help

Call 866-4-ELITES for a free consultation today

They’re an assessment to interpret what went wrong and how to better protect the security of your business data. You need experts who are qualified and experienced in remediation services to ensure efforts are prioritized properly based on the seriousness of the breach, the impact and potential costs to your organization.
Remediation after an IT security breach is a process that addresses the problems created as a result of your system being exploited by intruders. It uses algorithms known as vulnerability discovery models (VDMs).

This isn’t something you should put off. Data breach notification laws require that you notify your customers and other parties about the breach and take steps to remediate any harm it caused. If you don’t respond to a data breach promptly, this can result in even bigger problems for your organization. You must find out the extent of the damage to do this.

Our remediation team will determine what happened, what information was accessed, what systems were compromised, and which accounts were compromised. They’ll establish the span of the breach to decide how to solve it.
Think of us as you independent IT forensic investigators to help you determine the source and scope of the security breach. We will accumulate forensic images of your affected systems, collect and analyze the evidence, and outline the remediation steps to take.
We’ll ensure the existing auditing system remains intact and has been operational. This will help us determine the size of the breach and devise remediation methods. If auditing has been disabled (maybe someone inside or outside your organization did this to cover their tracks), we’ll have to restore it before proceeding. This will also help us establish whether breach activity is still ongoing and when we can conclude that it’s been terminated.
If you were using virtual machines or systems, we can take a snapshot of where you stood when the breach occurred. This gives us valuable information for the remediation. We can also analyze the snapshot at a later date if needed.

What Can We Do To Help?

Regardless of the type or scope of the breach, you should follow these steps. Do these things whether the security breach involved just one device, a number of systems, or if it was a company-wide intrusion. However, be sure to check with us first before doing anything.

  • Take all your affected devices offline but don’t shut them down or make any changes to them. We’ll take over from here. You want to stop any ongoing activity and block communication to and from the affected devices and systems. But you don’t want to delete any clues or contaminate evidence that we may need. Nor do you want to alert and aid the criminal involved.
  • Change all passwords and lock credentials. If a hacker got your users’ credentials, your IT network will be vulnerable until they’re changed – even after we’ve removed the hacker’s virus or malware. This is necessary to ensure the breach has ended as well. Do this for all your accounts whether you suspect they were compromised or not. Also, secure physical areas related to the breach.
  • Better call your legal counsel. You may need to hire one if you don’t have an attorney on staff or one who currently represents you. They can help you determine what federal or state laws you need to comply with. If you have legal, PR, HR or customer service departments be sure to keep them in the loop.
  • Implement your crisis communication plan You should have prepared one in advance that reaches all your affected audiences. Notify law enforcement, other affected businesses, and affected individuals. This would include your employees, business partners, customers, investors or other stakeholders. Reveal all important information so your customers or consumers can protect themselves, but don’t share any confidential information that might put them at greater risk.
  • Did the breach involve electronic Protected Health Information? If you must comply with HIPAA or HITECH, you must alert the Secretary of the U.S. Department of Health and Human Services (HHS). The HHS Breach Notification Rule explains all of this. Also, determine if you must comply with the Health Breach Notification Rule. If so you must also notify the Federal Trade Commission and sometimes the media as well.
  • If required, make a public announcement. Prepare for responses as well. This should also be part of your crisis communication plan. Public announcements could be in the form of press conferences, social media and website announcements or other forms of communication to reach all parties potentially impacted.Be sure to discuss what your organization has done and will do to remediate the breach and if those affected should do anything to protect themselves like contacting credit card companies or changing their user IDs or passwords. Provide information about how they can contact you with any questions, preferably via a hotline or a specially designed secure website.

How In The World Did This Happen In The First Place?

Try to figure out what happened and how information was accessed. Interview people who discovered the breach. Also, talk to anyone else who may know about it. Be sure your staff knows who to contact with any information they have that could help the investigation.
Document everything and share it with all the investigators including our techs. It’s not enough to remediate a data breach based on the information we find. You should help to determine the root cause. Ask your employees:

  • Did one of them accidentally give out their password?
  • Was your system properly patched for the particular vulnerability?
  • Did anyone plug an unauthorized laptop or another device into your business’s network and possibly introduce a virus or malware into it?
  • Did one of your employees simply leave an unencrypted laptop or mobile device out in the open that could have been monitored by a criminal?

There’s a lot to do to remediate a data breach, both technical, legal and public relations wise. But know that we’re here to help however we can. And remember that the best remedy is always prevention. It’s less of a hassle and less costly than a data breach.

Need more proof?

Our Clients Tell A Pretty Good Story About Their Digital Life.

“We have used Network Elites for about three years”

“We have used Network Elites for about three years during which we have grown from approximately 200 employees to 260, spread across a dozen locations including staff that work from home. We utilize many different systems both server and cloud based. Throw in a corporate office relocation, and it has been a challenging time to support our technology […] ” Read More

Mark Browder
CFO/COO
Child Care Group

Call us at (972) 235-3114 or email us at sales@networkelites.com now to find out more about our managed IT services for businesses in Dallas and surrounding areas.

Improve Video Conference Calls With The New PTZ PRO 2 Camera

Posted Jan 1, 2019 by JohnXYZ

Physical face-to-face meetings are on a sharp decline and this decline is attributed to a corresponding rapid growth of video conferencing technology. The last few years have seen immense development in telecommunications, especially on the teleconferencing front…

Read More insights from our blog

connect with us for a
FREE IT consultation

Let the solutions begin.

×