[BreachExchange] Data Breaches: Are You Ready (for the inevitable)?
Inga Goddijn
inga at riskbasedsecurity.com
Wed May 25 18:54:45 EDT 2016
http://www.jdsupra.com/legalnews/data-breaches-are-you-ready-for-the-23100/
In 2015, identity theft occurred every two seconds, disrupting the lives of
13.1 million people, according to Javelin Strategy and Research. Year after
year, U.S. data breaches have hit record highs, reports the Identity Theft
Resource Center.
Responsibility for cyber security has risen to the “C” level, where
executive officers and boards are now accountable for appropriate oversight
and safeguarding of the personally identifiable information (*PII*)
collected. Every company needs to be focused on preventing, detecting, and
responding properly to a data breach. Your company needs to have a
security plan and a response plan in place *before* a data breach occurs.
Historically, companies have been concerned primarily with damage to their
reputation resulting from a data breach incident. But the damage is
worsened if it turns out the breach could have been prevented!
PII includes your name, address, birth date, account numbers, email
addresses, passwords, and Social Security Number. It is virtually
impossible to be in business today and not collect or store PII.
*Preventing data breaches. Be Proactive.*
*Step one* is using best practices to prevent data breaches and their
resulting damage to your business’s finances, reputation, customer
relationships, and image.
Breaches can occur in countless creative ways but, in general, fall under
three main categories:
- Theft or loss of physical equipment, such as laptops, smart phones,
tablets and other mobile and storage devices.
- Illegal entry to deliberately access PII through hacking, viruses or
other methods.
- Inadequate oversight caused by lax system security.
The common denominator in most breaches is a current or former employee or
vendor. The data breach might be the intentional act of a disgruntled
person, or an employee tricked into opening a message that appears to be
genuine but is actually meant to break into your computer system by
malicious scams such as “phishing”, fake credentials, phony applications,
and other clever social engineering tricks.
The most important *proactive* step a company can take to prevent a data
breach is to have a comprehensive written information security plan (WISP)
in place that identifies what PII the company collects, how and where it is
stored, and who has authorized access to it. The plan should be
implemented on an enterprise-wide basis (throughout the company, not just
in the IT department), and it should be tested periodically to identify and
manage any security risks and to ensure that all employees and vendors are
complying with the plan.
*The key elements of an Incident Response Plan.*
*Step two* is the creation of an Incident Response Plan, the go-to game
plan with detailed action steps in case a data breach happens. Your
response plan should be documented in writing and regularly updated and
tested.
Your Incident Response Plan should address *key questions*:
1. *Who’s on the team?* Many people should be at the table, including
in-house personnel and outside vendors (including some you may wish to have
on retainer in case a data breach occurs). Legal counsel should provide
guidance about legal requirements, including applicable notice requirements
in your business’s home state and in the states and countries where your
customers or clients reside. Public relations personnel, skilled in crisis
management, should have draft notification letters (ready in advance of a
breach) – that are honest but calm – explaining the breach and the
remediation steps you are taking. IT experts must be engaged in advance,
standing ready to investigate the cause of the breach and take immediate
steps to contain the damage.
2. *Who’s in charge?* One person must serve as project manager or team
leader – the primary decision maker. The team reports to this person, who
in turn reports to executives (and the board). The leader must be capable
of sharing technical and legal information clearly, consistently, and
without jargon.
3. *Who needs to be notified?* Legal counsel will help you determine if
notification is required and who needs to be notified. This will depend on
whether you can determine what PII was accessed, whether it was strongly
encrypted, and what was done with the PII that was exposed.
4. *Should law enforcement be contacted?* This is a delicate issue,
since the information involved is often proprietary. Legal advice is
needed to determine whether law enforcement must be contacted. Businesses
should build relationships with law enforcement agencies in advance, so you
are not calling the FBI, Secret Service, FTC, state attorneys’ general, or
Homeland Security out of the blue. Law enforcement agencies can sometimes
advise businesses on data security practices and even assist them with
table-top exercises to look for problems and help plan a response to a data
breach.
5. *What recourse will be offered to victims?* After breaches, most
companies offer customers some form of remediation, often free credit
monitoring. These steps will be determined once your response team
determines what PII was accessed, what harm has been caused by the breach,
and whether the data was just viewed or duplicated.
6. *What’s the budget?* Incident Response Plans often rely heavily on
outside professionals and vendors to perform the legal analysis, technical
and forensic investigations, external and internal communications, credit
monitoring, and other steps the plan provides for – all of which is
expensive. Increasingly, businesses are purchasing cyber insurance to cover
the costs of data breaches.
*Don’t wait for an emergency! Plan for the inevitable.*
After a data breach occurs is not the time to be writing a plan and
drafting letters.
The Incident Response Plan is essential to being ‘crisis-ready’. Bringing
on an experienced firm that can help you plan for and implement practical
solutions to privacy threats and breaches and advise your business on
protecting data is critical. Solutions vary by industry, due to state and
federal laws and regulations, but with diligent guidance, businesses can do
their utmost to protect their reputations and their customers from data
breaches.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20160525/458c8f52/attachment.html>
More information about the BreachExchange
mailing list